Unlock instant, AI-driven research and patent intelligence for your innovation.

Access authentication method of wireless mesh network

A technology of network access and authentication method, applied in the field of wireless Mesh authentication, it can solve the problems of breaking equality, asymmetric encryption, large amount of calculation, inapplicability to WMN network, etc., and achieve the effect of good service

Inactive Publication Date: 2009-07-29
BEIJING UNIV OF TECH
View PDF0 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the operation of EMSA relies on the key holder MKD (Mesh keydistributors). The introduction of MKD breaks the equality between devices in the Mesh network and directly threatens the confidentiality of user data.
Recently, a security mechanism based on EAP-TLS has been proposed. Although EAP-TLS has good security, such as mutual authentication and robustness against malicious attacks, asymmetric encryption requires a large amount of calculation, and Not suitable for light WMN networks, and the need to establish and manage PKI also brings great complexity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access authentication method of wireless mesh network
  • Access authentication method of wireless mesh network
  • Access authentication method of wireless mesh network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] To achieve the above goals, we implement the following figure 2 The network model shown.

[0077] 1. Network model

[0078] The designed network model, such as figure 2 As shown, the model has the following characteristics:

[0079] (1) The entire wireless Mesh network consists of a backbone network and two regional networks;

[0080] (2) The backbone network consists of 4 backbone routers, an offline CA that accesses the network only when an attack node is notified, and an authorized certificate library that only the backbone routers can access. Among all the backbone routers, there are two backbone routers wired to the Internet;

[0081] (3) In each area network, there are 2 area routers connected to the backbone router and end users. Area routers share a database storing user ID, area ID, authorization key and user information (ID card, mailbox, mailing address, mobile phone);

[0082] (4) 54Mbps wireless connection is adopted in the backbone network, and 11M...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A wireless meshed network access authentication method belongs to the computer network field. When the system is initializing, offline CA gives a public-private key pair respectively to the system and itself; user provides user basic information to the offline CA to register for obtaining a public-private key pair and a public key certificate before accessing the network; if user want to serve as a backbone or an area router, it further need to provide an application; the offline CA selects users with better performances to serve as backbone and area router; the backbone router manages the system public-private key pair according to (n, t) threshold system, and gives authorization certificates and identity-based private keys to users. if a user want to enter some area, it provides the authorization certificate to the area router of the area, verifying with the area router to each other by the authorization certificates, and negotiating the authorization secret key of itself using three-sides agreement algorithm in order to access the area network. The method can effectively prevent unauthorized user from entering into network, and enable the authorized user to be quickly authenticated to acquire the resource service in network.

Description

technical field [0001] The invention relates to a wireless Mesh authentication method, which can be applied to the access authentication of the wireless Mesh network user and the fast authentication when the user roams between different areas, and belongs to the field of computer networks. Background technique [0002] Wireless Mesh network is a new type of wireless network technology completely different from traditional wireless network, because wireless Mesh network is expected to overcome some limitations of Ad Hoc network, wireless local area network, wireless personal area network, wireless metropolitan area network, and can improve its performance And provide a fast, simple and cheap network distribution system, so it is increasingly becoming the first choice for wireless Internet service providers to build network connections. Since the mobile user needs to re-authenticate when accessing the wireless Mesh network and roaming, this process not only requires a small au...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04W12/08H04L9/32H04L29/06H04W84/18
Inventor 何泾沙付颖芳李国瑞肖鹏王戎
Owner BEIJING UNIV OF TECH