Access authentication method of wireless mesh network
A technology of network access and authentication method, applied in the field of wireless Mesh authentication, it can solve the problems of breaking equality, asymmetric encryption, large amount of calculation, inapplicability to WMN network, etc., and achieve the effect of good service
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0076] To achieve the above goals, we implement the following figure 2 The network model shown.
[0077] 1. Network model
[0078] The designed network model, such as figure 2 As shown, the model has the following characteristics:
[0079] (1) The entire wireless Mesh network consists of a backbone network and two regional networks;
[0080] (2) The backbone network consists of 4 backbone routers, an offline CA that accesses the network only when an attack node is notified, and an authorized certificate library that only the backbone routers can access. Among all the backbone routers, there are two backbone routers wired to the Internet;
[0081] (3) In each area network, there are 2 area routers connected to the backbone router and end users. Area routers share a database storing user ID, area ID, authorization key and user information (ID card, mailbox, mailing address, mobile phone);
[0082] (4) 54Mbps wireless connection is adopted in the backbone network, and 11M...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 