Simulation system and simulation method of wireless network security protocol

A security protocol, wireless network technology, applied in the field of wireless network protocol simulation, to achieve the effect of convenient loading, reducing program complexity and low coupling

Inactive Publication Date: 2010-09-29
XIDIAN UNIV
View PDF2 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to overcome the deficiencies of the prior art, provide a wireless network security protocol simul

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Simulation system and simulation method of wireless network security protocol
  • Simulation system and simulation method of wireless network security protocol
  • Simulation system and simulation method of wireless network security protocol

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0085] Examples:

[0086] In order to test the effectiveness of the simulation platform, the present invention takes the test of the WEP security protocol module implemented by the user as an example to illustrate the simulation of the present invention.

[0087] 1. Simulation scenario

[0088] Figure 4 Shown is the scenario used in this test, S is the applicant, AP is the authenticator, and STA is the destination node for S to send data packets. Figure 5 Shown is the node model of applicant S who joined the WEP security protocol module, Image 6 Shown is the node model of applicant S who has not joined the WEP security protocol module.

[0089] This test uses two simulation scenarios. The parameter settings of the two simulation scenarios are the same. S starts to send data packets from the 0th second, working time is 30 seconds, non-working time is 15 seconds, and is sent to the scene every 1 second during working time. The STA sends a data packet, and the simulation run time is s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a simulation system of a wireless network security protocol, which mainly solves the problem that the existing simulation technology can not support the test and the evaluation of wireless network security protocol performance. The system comprises an application layer, a network layer, a data link layer and a physical layer, wherein a security management simulation layer is added between the data link layer and the network layer, the security management simulation layer comprises a security protocol module, a security protocol interface module and a data management module, wherein the security protocol module is used for realizing the authentication logic function of the wireless network security protocol; the security protocol interface module is used for providing standard data encapsulation and communication primitive, setting the data unit information of an interface, completing the adaptation and load with any security protocol module; and the data management module is used for identifying and distributing protocol data streams, and transmitting the protocol data streams to the data link layer or the security protocol interface module. The invention has the advantages of integrity, independence and expansibility, can realize the test and the evaluation of wireless network security protocol performance.

Description

technical field [0001] The invention belongs to the technical field of wireless network security, relates to the simulation of wireless network protocols, and is used to solve the design, evaluation and test problems of various wireless network security protocols. Background technique [0002] With the rapid development of computer network technology, wireless networks are playing an increasingly important role in the process of networking. change. The wide application of wireless network technology further expands the capability of data communication. In order to protect the communication security of the wireless network, the development of security protocols has become a hot issue concerned at present. The development of security protocols needs to be validated, so there is an urgent need to test and evaluate their performance and efficiency. [0003] The computer simulation method can design the required network model according to the needs, understand the various char...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W24/06H04W80/00H04L29/06
Inventor 杨超高俊涛马建峰李兴华沈玉龙曾勇王超
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products