Font Size: a A A

Two Security Authentication Protocal Research Of Wireless Mesh Network

Posted on:2011-04-05Degree:MasterType:Thesis
Country:ChinaCandidate:G P ZhaoFull Text:PDF
GTID:2178330332967113Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
Wireless communications and mobile computing technology are developing rapidly in recently years. In order to break through the "last mile" bottleneck of the traditional wireless access, wireless Mesh Network (WMN, Wireless Mesh Network) technology is extensive attention now.In addition to have the general wireless network features, it also has other features such as multi-hop, and a variety of network access methods. These features are all great advantage with compare to the other wireless communication technologies; on the other hand, they are weakness of this technology from a security point. That's why the research of wireless Mesh network security technology has important theoretical and practical significance. This article is discussing about the safety of WMN, analyzing and studying the security threats and the existing solving methods.First of all, explain the definition of wireless Mesh network technology. Discussing the features of WMN, the differences from the other mobile networks and shows several Wireless Mesh Network structure.Secondly, describe the security standards and protocols of the Wireless Mesh Network, and detailed analysis the security problems facing as a new generation of wireless broadband access technologies.Finally, Analysis the related security technology of WMN based on the three starting points (authentication and authorization, communication security, non-repudiation). Furthermore provides some security programs for reference.
Keywords/Search Tags:Wireless Mesh Networks, security standards and protocols, communication security
PDF Full Text Request
Related items