Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access authentication method for wireless mesh network

A wireless mesh network and wireless mesh network technology, applied in wireless communication, user identity/authority verification, security devices, etc., can solve problems such as two-way authentication MKD logic conflicts, avoid link establishment failure, and ensure security. Effect

Inactive Publication Date: 2014-04-02
GCI SCI & TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The embodiment of the present invention proposes a wireless mesh network access authentication method to solve the problem of two-way authentication and MKD logic conflicts between mesh network nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access authentication method for wireless mesh network
  • Access authentication method for wireless mesh network
  • Access authentication method for wireless mesh network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0031] DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS, the second mesh network node detects the reception of the surrounding mesh network nodes by receiving beacon frames of the surrounding mesh network nodes, or the second mesh network node sends detection request frames. Signal Strength (Received Signal Strength, RSS) to discover the first mesh network node that has passed authentication, and use the first mesh network node as the authenticator to send a first access authentication request message to it.

[0032] S12: After receiving the first access authentication request message, the first mesh network node uses a private key to encrypt the certificate of the first mesh network node and the first access authentication request message together to generate a first certificate The authentication request message is sent to the authentication server;

[0033] S13. After receiving the first certificate authentication request message, the authentication server uses the public key o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access authentication method for a wireless mesh network. In the method, a second mesh network node finds out a first mesh network node passing authentication by detecting a node signal existing peripherally, takes the peer-to-peer first mesh network node as an authenticator and sends an access request to the authenticator; and the peer-to-peer authentication among Mesh equipment is realized through ternary authentication among the authenticator, a requestor and an authentication server, and the requestor accesses to Mesh through the authenticator. By adopting the embodiment of the invention, a conflict problem between bidirectional authentication between the mesh network nodes, and MKD (Mesh Key Distributor) logic can be solved.

Description

Technical field [0001] The invention relates to the technical field of wireless mesh networks, in particular to a method for access authentication of wireless mesh networks. Background technique [0002] Wireless Mesh network (also known as wireless mesh network) technology is a new wireless mobile communication technology based on IP access, suitable for regional environment coverage and broadband high-speed wireless access. Each node in the wireless Mesh network can send and receive signals, and each node can directly communicate with one or more peer nodes. Each network node is connected in a wireless multi-hop manner through other adjacent network nodes, which can greatly increase the coverage of the wireless system. [0003] The wireless Mesh network includes four logical network devices, namely Mesh Point (MP), Mesh Access Point (MAP), and Mesh Point with a Portal , MPP) and user terminal (Station, STA). The wireless Mesh network architecture defined in 802.11s is as follo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/08H04L29/06H04L9/32H04W12/0431H04W12/069
Inventor 杨峰陈康先伍绍秋
Owner GCI SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products