Authentication accessing method of wireless multi-hop network

A wireless multi-hop network and access method technology, applied in the field of network authentication access, can solve problems such as security risks of authentication methods, achieve the effects of improving security and performance, ensuring communication security, and improving performance

Inactive Publication Date: 2008-07-30
CHINA IWNCOMM
View PDF0 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to provide a wireless multi-hop network authentication access method, which solves the security risks of existing wireless multi-hop network authentication methods question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication accessing method of wireless multi-hop network
  • Authentication accessing method of wireless multi-hop network
  • Authentication accessing method of wireless multi-hop network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0102] The invention is applicable to the security application protocol when the WAPI framework method (TePA, an access control method based on ternary peer-to-peer authentication) is applied on specific networks including wireless local area networks and wireless metropolitan area networks.

[0103] In the authentication access system of the wireless multi-hop network, the purpose of authentication is to establish trust between the terminal device and its associated coordinator, and to protect the data transmitted on the link between them. The terminal device and its associated coordinator belong to the same management domain, that is, a wireless multi-hop network, and the trusted center of the wireless multi-hop network needs to configure all devices in the wireless multi-hop network, such as: Configure key information under different authentication and key management suites.

[0104] In the authentication access system of the wireless multi-hop network, the coordinator broa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an authentication access method of a wireless multi-hop network. The invention is applicable to the safety application protocol of the WAPI framework method (TePA, the access control method which is based on the triple peer-to-peer identification) during the application on the specific network which includes a wireless LAN, a wireless MAN and a wireless PAN. A terminal equipment and a coordinator have the port control ability, the terminal equipment selects the authentication and key management suit and sends the connection request to command the coordinator after the broadcast beacon frame of the coordinator, the coordinator carries out the authentication together with the terminal equipment according to the selected authentication and key management suit by the terminal equipment, the connection response command is sent to the terminal equipment after the finish of the authentication; the terminal equipment and the coordinator carries out the control to the ports according to the authentication result, so as to realize the authentication access of the wireless multi-hop network. The invention solves the technical problem of the safety hidden trouble of the prior authentication method of the wireless multi-hop network.

Description

technical field [0001] The invention relates to a network authentication access method, in particular to an authentication access method for a wireless multi-hop network. Background technique [0002] With the development of computer network and global mobile communication technology, portable digital processing terminal equipment has become a necessity in people's daily life and office, these terminal equipment include notebook computers, personal digital assistants (PDA), computer peripherals, mobile phones, pagers and home electronics, etc. They all have strong processing power and large storage space, thus forming a personal operating space (POS). However, at present, most of the information exchange between these terminal devices still depends on the connection of cables, which is very inconvenient to use. People increasingly need a wireless technology to connect these terminal devices in the personal operating space to truly realize the communication between terminal ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/08H04L29/06H04L12/28H04W12/0431H04W12/069H04W12/08
CPCH04L63/061H04L63/0807H04W88/02H04L9/0844H04L9/3226H04L9/3263H04L2209/80H04W12/0433H04W12/069
Inventor 肖跃雷曹军赖晓龙黄振海
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products