MESH network authentication method, MESH network node and MESH network
A network authentication and node technology, applied in security devices, electrical components, wireless communication, etc., can solve problems such as complex authentication process
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0055] In order to have a clearer understanding of the technical features, purposes and effects of the present invention, the specific implementation manners of the present invention will now be described in detail with reference to the accompanying drawings.
[0056] Such as figure 1 and figure 2As shown, in the first embodiment of a MESH network authentication method of the present invention, the method is applied to the master node, which specifically includes the following steps: A1, obtaining the root key share Key corresponding to the MESH network; A2, adding the second A random number sequence RAND to the root key share Key to generate the corresponding Kmesh; A3, generate the encryption key Kenc and the integrity key Kint based on the key derivation function and Kmesh; A4, according to the encryption key Kenc and the integrity key Kint generates broadcast information and sends it to the corresponding slave node, so that the slave node can extract the encryption key K...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


