Wireless LAN safety connecting-in control method

A wireless local area network and secure access technology, which is applied in the field of wireless local area network security, and can solve the problems of waste, roaming and other functions.

Inactive Publication Date: 2003-11-12
SOUTHEAST UNIV
View PDF0 Cites 64 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the process of improvement, in order to maintain compatibility with the original protocol, the draft still retains the security access control scheme of the original protocol, but does not care about its results, but implements a new security access control scheme after the original scheme , which makes the original program process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless LAN safety connecting-in control method
  • Wireless LAN safety connecting-in control method
  • Wireless LAN safety connecting-in control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention will be further described below in conjunction with the embodiment shown in accompanying drawing:

[0046] The wireless local area network security access control method of the present invention is characterized in that: when a STA that has not established a security association with any AP enters the service range of a certain AP, the STA establishes a connection with the AP and negotiates security performance, and then the STA sends a security association establishment link to the AP. The authentication server AS uses the IEEE 802.1x authentication protocol to authenticate the STA. If the authentication fails, the AS notifies the AP to reject the STA’s request to establish a security association. If the authentication succeeds, the peer-to-peer master secret is negotiated between the STA and the AS. PMK, the AS sends the PMK to the access controller AC to register the associated information and PMK information of the corresponding STA; the AC then...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The control course includes three stages: setting up connection and safety performance bargin as broadcasting connection request by STA and all AP at the area to send connection response message declaring all data protective method to STA; setting up safe correlation a sending 802.1x authentication request message to AC by AP after STA safe correlation request received to request AC to use 802.1x authentication protocol to make authentication for STA by AS; resetting up safe correlation as switching the correlative switch in point from one area to another by STA as well as setting up connection and bargaining safety performance by STA and AP* as per steps in the first stage under the roaming condition with AP* service range being entered by STA.

Description

1. Technical field [0001] The invention relates to an enhanced security access control method for a wireless local area network based on the IEEE 802.11 standard, especially enhances the security access control function of the medium access control (MAC) layer of the wireless local area network, and belongs to the technical field of wireless local area network security. 2. Background technology [0002] Wireless local area network (Wireless Local Area Network, WLAN) is the application of modern wireless communication technology in the computer network with rapid development. And multimedia applications provide the means of realization. However, the security requirements in the WLAN environment will be more stringent than those in the wired environment due to the openness of the data transmission medium. The service area of ​​the wireless LAN has no effective boundaries, and attackers can easily enter the service area to carry out illegal attacks without...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/14H04L9/28H04L9/32H04L12/24H04L12/28H04L29/06
Inventor 曹秀英沈平郑晓蕾王璐耿嘉李枫
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products