Identity authentication protocol selection method in wireless network

A technology of identity authentication and wireless network, which is applied in the field of identity authentication protocol selection, and can solve problems that are not completely suitable for wireless network authentication protocols.

Inactive Publication Date: 2014-05-28
中电福富信息科技有限公司
View PDF2 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, these schemes are not completely suitable for the selection of wireless network authentication protocols.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication protocol selection method in wireless network
  • Identity authentication protocol selection method in wireless network
  • Identity authentication protocol selection method in wireless network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Please refer to figure 1 , a method for selecting an identity authentication protocol in a wireless network, the user sets the importance weights of security, energy consumption, and authentication time respectively, calculates the applicability of each identity authentication protocol in the wireless network through the weights, and selects the applicability High authentication protocol.

[0023] On the basis of the above technical solution, the calculation of the applicability of each identity authentication protocol in the wireless network through the weight includes:

[0024]

[0025] W sec , W s_con , W au_time are the weights set by the user for security, energy consumption, and authentication time,

[0026] The weight satisfies W sec +W e_con +W au_time = 100%; and V sec_1 , V e_con_1 , V au_time_1 is passed on for security V sec , energy consumption V e_con and authentication time V au_time normalized to get. For users, the greater the applicabi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication protocol selection method in a wireless network. The identity authentication protocol selection method in the wireless network comprises the steps that the weight of importance of security, the weight of importance of energy consumption and the weight of importance of authentication time are set by a user, the applicability of each identity authentication protocol in the wireless network is calculated according the weights of importance, and an identity authentication protocol with high applicability is selected. According to the identity authentication protocol selection method in the wireless network, the characteristics, such as authentication delay and identity protection, of the identity authentication protocols in the wireless network are fully considered, a targeted authentication protocol selection method is designed. From the point of view of users, several elements, mostly concerned by the users, such as the security of the protocols, the energy consumption, the authentication time and the user preference are considered comprehensively, and a solution capable of meeting the individual requirements of the users is provided.

Description

technical field [0001] The invention relates to a method for selecting an identity authentication protocol in a wireless network. Background technique [0002] With the development of wireless communication technology, wireless network plays an increasingly important role in people's life, but its openness requires it to have a more robust security protection mechanism. Identity authentication is a vital technical means to ensure wireless network security. Researchers have done a lot of work in this direction: According to Wikipedia, there are currently more than 40 EAP authentication methods in WLAN, researchers have also proposed many authentication methods for RFID, and there are also a large number of authentication methods in wireless sensor networks. authentication protocol. But these works mainly start from the designer's point of view, conduct research on a specific authentication protocol, and analyze and evaluate its security and performance. But from the perspe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06
CPCY02D30/70
Inventor 李兴华邓凌娟赵婧张渊马建峰高胜姚青松姜奇
Owner 中电福富信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products