Wireless mesh network system and method for key distribution
A wireless mesh network, mesh network technology, applied in the application field of Mesh network, can solve problems such as inability to communicate
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0162] see Figure 9 It is a flowchart of key distribution between MP nodes after successful authentication in the embodiment of the present invention, including:
[0163] Step 61: Two authenticated MP nodes perform link establishment and key negotiation;
[0164] Step 62: When the key distribution domains MKDD-ID to which the two authenticated MP nodes belong are different, the key distribution cannot be performed; otherwise, the authenticated MP nodes negotiate to use the session master key PMK of one of the MP nodes , another MP node initiates a key distribution request to the MPP or AC to obtain the session master key PMK;
[0165] Step 63: The two authenticated MP nodes perform a four-way handshake according to the session master key PMK through a four-way handshake protocol, and negotiate to establish a temporary session key PTK.
[0166] Where, PTK=PRF-length(PMK, PTKSNonce, PTKANonce, MA-ID, MP-ID, PMK-MAName);
[0167] Among them, before key distribution between MP...
Embodiment 2
[0194] Key distribution is performed between two successfully authenticated MP nodes. According to the idea of the ticket, when each authenticated MP node requests key distribution, it distributes a ticket to it through AC or MPP using its authenticated authorization information. , each MP performs two-way authentication through the ticket and negotiates to establish a temporary session key. Among them, the key distribution entity AC or MPP has a pseudo-random number generator to generate a key, and provides a session master key for the peer-to-peer two MPs. The specific process is divided into two cases.
[0195] When it is the Local mode, the process of key distribution of the successfully authenticated MP nodes (assumed to be MP1 and MP2) in the embodiment of the present invention includes:
[0196] Step 71: MP2-->MPP: {Replay counter||MP1A||MP2A||MP1-ID||MP2-ID||Nonce1||Nonce2 MKDD-ID||}
[0197] MP2 initiates a key distribution request to MPP, and the key distribution...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com