Font Size: a A A

Research On The Efficient WLAN Access Authentication Technologies And Its Engineering Application

Posted on:2018-10-22Degree:DoctorType:Dissertation
Country:ChinaCandidate:K X ChenFull Text:PDF
GTID:1318330566954705Subject:Electronics and information
Abstract/Summary:PDF Full Text Request
Along with the fast development of mobile Internet,the mobile telecommunication infrastructure is upgrading with high pace,and the smart mobile terminals are becoming more common and innovative.All these have led to huge changes on people's communication,production,study,and life style.China is one of the countries that are experiencing this mobile Internet revolution,and the social as well as personal life of the citizens is being altered.However,no matter what mobile Internet will be like eventually,there is one problem that has to be solved which is the cyber security.Cyber security involves with the national security which is the base of the Chinese telecommunication.Due to the openness of the wireless spectrum and Internet network,how to ensure the connection to a trusted network and achieve reliable data communication is a key and fundamental question to the wireless network communication.The solution to these questions are mainly based on the IEEE standard,IEEE 802.11 i,and the national standard GB15629.11(WAPI).The core part of these two standards is similar,which can help solve the security problem of Internet access.However,it might take more computing load,longer access time,and more complicated credential process,which will lower the efficiency of the secure access and affect the large scale deployment as well as the user experience.Thus,the question turns out to be how to achieve quick access and roaming in a well-covered network provided a secure credential process is realized.This paper is about the discussion of advanced technology exploration,research,and engineering application for the quick mobile access and roaming,which mainly include the following:(1)Conduct profound analysis of the requirement of the non-sense authentication,and come up with the solution that is based on artificial intelligence which is to study the user habits,establish a workable behavior model,and fix the MAC address.The solution can help achieve the quick access to a trusted network.This dissertation propose a rapid secondary access method dynamically generate shared big data sets,hence eliminating duplicated multiple access authentication steps and algorithm calculations in the system,while enabling terminals' rapid secondary access authentication on a reduced CPU usage,eventually increases the efficiency of secure wireless network.(2)An efficient seamless handoff for wireless Mesh Network is proposed.The technology uses seamless handoff to reduce the handoff time delay.By binding the IP address with the STA physical address,address mapping table and routing algorithm in STA are designed.In order to realize the effective handoff in wireless Mesh Network,the buffering strategy is built between source MAP and target MAP and the communication data package is kept during the handoff process.By employing the buffering strategy of network devices and the new path searching algorithm,the pressure during switching for STA and the package lose rate is reduced,and the seamless and quick switching handoff for wireless Mesh Network is realized.(3)To improve the quality of service in wireless sensor networks is proposed a method for the improved AFSA distributed coverage control algorithm combination.First,the basic AFSA improve and validate.Secondly,the improved AFSA and wireless sensor networks coverage control combine to cover the abstract control problem as a function,and the application of wireless sensor networks for artificial fish behavior described.Finally research LEACH clustering algorithm,proposed a new method of clustering cluster head evenly distributed.And,after the completion of clustering in the cluster using the improved AFSA node scheduling.Based on the verification of the construction testing data from the telecom operator and southern university campus network,the access speed and roaming is improved effectively,provided that a secure credential and roaming is achieved.
Keywords/Search Tags:WLAN, rapid access, efficient, non-sense authentication, secondary access, handoff, covering control, AFSA
PDF Full Text Request
Related items