Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wireless mesh network access security authentication method based on WLAN

A security authentication and network access technology, applied in the fields of access security authentication and wireless mesh network access security authentication, it can solve problems such as feasibility doubts, authentication failures, and reduced network performance to ensure compatibility and flexibility. The effect of stability, ease of implementation, and good compatibility

Inactive Publication Date: 2009-03-25
SHANGHAI JIAO TONG UNIV
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Its disadvantages are also obvious: First of all, the number of messages in this authentication method is twice that of the ordinary 802.11i protocol, and the implementation will greatly reduce the network performance, which is unacceptable for wireless networks
Secondly, this solution cannot really solve the self-organization problem of Mesh nodes, because not all Mesh nodes have the function of providing authentication for other nodes, such an authentication method can easily generate a large amount of network overhead and then fail to authenticate
In the end, the document did not give the implementation details, and its specific implementation feasibility is also questionable.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless mesh network access security authentication method based on WLAN
  • Wireless mesh network access security authentication method based on WLAN

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The embodiments of the present invention are described in detail below in conjunction with the accompanying drawings: this embodiment is implemented on the premise of the technical solution of the present invention, and detailed implementation methods and specific operating procedures are provided, but the protection scope of the present invention is not limited to the following the described embodiment.

[0023] In this embodiment, a new node MP joins the network and authenticates with a Mesh node MA with authentication capability as an example:

[0024] The first step is to initialize the MSA related parameters, data structure and PLM state machine while the Madwifi driver is initialized.

[0025] The MSA parameter is an extension of the RSN parameter in 802.11i, including whether to use the MSA function, whether to require EAP authentication, supported EAP methods, and so on. It can be roughly divided into two types determined by configuration and dynamically determ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention disclose a security certificating method for the access of the wireless mesh network based on a wireless local area network in the technical field of wireless networks. When both certificating sides enter a PLM process used for exchanging security parameters after completing 802.11 open certification; a PLM state machine takes over the operation of a 802.11 state machine; the PLM process is composed of a pair of equivalent link requesting / equivalent link confirming messages respectively sent by both certification sides; a 802.11i / RSN security parameter and a 802.11s / MSA security parameter are mutually consulted, and a storage key used for pre-certification is selected, and the role of each during the following EAP certification stage is determined; the PLM state machine controls a mechanism for transceiving and retransmitting the message; and when the PLM process is over, the mechanism is recontrolled by the 802.11 state machine, and an internal event calling IOCTL is produced to notify an EAP user end to prepare to begin an EAP certification process and four times of handshake interaction. The method satisfies the new features such as the dynamical self-organization of a WLAN Mesh network, and has reliable safety performance.

Description

technical field [0001] The invention relates to an access security authentication method in the technical field of wireless networks, in particular to a wireless mesh network access security authentication method based on a wireless local area network. Background technique [0002] Wireless Mesh Network (Wireless Mesh Network) is an emerging wireless access technology. Because of its self-organization, easy expansion, low cost and other characteristics, it is widely used in municipal management, disaster relief, security monitoring, industrial management, medical emergency and other fields. In view of its main application fields, how to ensure the security of Mesh networks is one of the key issues for the successful application of this technology. [0003] Madwifi is a system driver developed for Atheros (Atheros Communications Corporation) 802.11 wireless network chip, which is mainly used for the functional interaction between the operating system and the wireless network...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 吴越朱近丹易平李建华
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products