Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

WAPI-based authentication method of wireless mesh network

A technology of wireless mesh network and authentication method, which is applied in the field of authentication in wireless mesh network, can solve problems such as transplantation application, security problems restricting the large-scale implementation of wireless mesh network, and affecting network communication security, so as to achieve security Effect

Inactive Publication Date: 2009-06-03
GCI SCI & TECH
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Since the wireless mesh network is a distributed network without a central point, and its wireless access points are connected to each other through wireless, it is a loose connection relationship, and the client nodes generally have mobility. It is extremely vulnerable to interference and eavesdropping by other malicious nodes, which affects the security of network communication, making security one of the problems restricting the large-scale implementation of wireless mesh networks
[0009] Although the WAPI used in the wireless local area network has good security features, however, because the wireless local area network is connected to the wireless access point after the station, the wireless access point is directly connected to the authentication server through a wired method, and the security is implemented through WAPI. During authentication, the three-element authentication process between the site, the wireless access point and the authentication server is directly carried out, and the network architecture of the wireless mesh network is obviously much more complicated than that of the wireless LAN. It not only has the MAP of the access site, supports The gateway node MPP for mesh interconnection and intercommunication with the external network also has MP for mesh interconnection. In specific communication, one data transmission needs to pass through multiple different nodes, so the above-mentioned three-factor authentication process cannot be directly applied. It is impossible to directly transplant the WAPI applied to the wireless local area network into the wireless mesh network. If the WAPI can be applied to the wireless mesh network, the security problem of the wireless mesh network can be improved. Appearance of WAPI Applied to Wireless Mesh Network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • WAPI-based authentication method of wireless mesh network
  • WAPI-based authentication method of wireless mesh network
  • WAPI-based authentication method of wireless mesh network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] see figure 2 As shown, it is a schematic flowchart of Embodiment 1 of the WAPI-based wireless mesh network authentication method of the present invention.

[0031] In this embodiment, the default authentication server AS has issued corresponding certificates for each MPP, MP, and MAP node, and these MPPs, MPs, and MAPs have also installed the certificates issued to them by the authentication server AS. , and the authentication and authentication server is in a routeable location in the wired network.

[0032] Such as figure 2 As shown, the method in this embodiment includes steps:

[0033] Step S101: The requesting node completes the association with the node that has connected to the network, and proceeds to step S102;

[0034] Step S102: The node that has connected to the network sends authentication activation information to the requesting node, wherein the authentication activation information may specifically include the identification of the authentication ac...

Embodiment 2

[0056] see image 3 As shown, it is a schematic flow chart of Embodiment 2 of the WAPI-based wireless mesh network authentication method of the present invention. In this embodiment, it is mainly aimed at the description of the authentication process when a station accesses the network.

[0057] Such as image 3 As shown, it specifically includes steps:

[0058] Step S201: The station completes the association with any MAP node that has been connected to the network, and proceeds to step S202;

[0059] Step S202: The MAP node that has connected to the network sends authentication activation information to the station, wherein the authentication activation information may specifically include the identification of the authentication activation information, the identity information of the authentication server, and the certificate of the MAP node that has connected to the network and other information, because the identification process of WAPI adopts the elliptic curve signat...

Embodiment 3

[0117] see Figure 5 As shown, it is a schematic flowchart of Embodiment 3 of the WAPI-based wireless mesh network authentication method of the present invention. In this embodiment, it is mainly described for new nodes that newly join the network.

[0118] Such as Figure 5 As shown, it specifically includes steps:

[0119] Step S301: The new node completes the association with each node that has been connected to the network, and the process of completing the association between the new node and each node that has been connected to the network can be in any order, and enter step S302;

[0120] Step S302: Each node that has connected to the network sends authentication activation information to the new node, wherein the authentication activation information may specifically include the identification of the authentication activation information, the identity information of the authentication server, and the node that has connected to the network. Information such as certifi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a WAPI-based authentication method of a wireless mesh network. The method comprises the following steps: an identification and authentication server intensively identifies various nodes to realize centralized management, after an association process of a request node and a node which is accessed to the network is completed, the node which is accessed to the network sends authentication activation information to the request node, subsequent processes of certificate authentication and shared key establishment by a session key are started, the shared key is established between the request node and the node which is accessed to the network, thus organically combining WAPI with the wireless mesh network, and after the shared key is established by the request node and the node which is accessed to the network through a key agreement, a data communication process can be completed according to the shared key to realize safe communication process.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to an authentication method in a wireless mesh network. Background technique [0002] The increasing development of network communication technology provides convenience for people to freely obtain network resources. However, this way of freely obtaining network resources puts forward higher requirements for security. The lack of security guarantees will make illegal operations on the network It is easy to implement and thus affects the security of upper-layer communication content and affects the rights and interests of users. [0003] WAPI (Wide Authentication and Privacy Infrastructure) is a security architecture that realizes two-way authentication and confidentiality between communication nodes and network bearer nodes, and is suitable for mainstream network physical topologies. Various security flaws in the international standards of WLAN, and the security technical soluti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04W12/04H04W84/10H04W12/0431H04W12/069
Inventor 周绍午吴月辉
Owner GCI SCI & TECH
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More