Font Size: a A A

Analysis And Implementation Of An Efficient Wireless Mesh Network Security Access Authentication Protocol

Posted on:2011-03-17Degree:MasterType:Thesis
Country:ChinaCandidate:B J LiFull Text:PDF
GTID:2178330332988076Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Convenient and accurate wireless networking technology has been developed rapidly, especially Wireless Mesh Network, a new type of network access technology which progresses rapidly in recent years due to its flexibility, strong adaptability and broad coverage, and gradually becomes one of the key technologies of the next generation wireless networks. In order to deal with current attacks on a wide range of wireless network technology, any kind of wireless network technology has to take network security issues into account, and certainly Wireless Mesh Network also considers this problem.At present a variety of Wireless Mesh security protocols have appeared, in order to verify the feasibility and robustness of these protocols, it is important to implement and test authentication protocols in a real network environment.Based on the study of several existing authentication methods for Wireless Mesh networks, this paper analyses the features of an efficient Wireless Mesh security access authentication protocol. At the same time, it is implemented and tested in a real environment of wireless Mesh network. Firstly, the architecture, features and prospect of Wireless Mesh networks are introduced. Then, this paper analyses features and interactive process of an efficient Wireless Mesh Networks access authentication protocol based on current Wireless Mesh Networks security goals. Finally, through analysis of procotols and correlative codes, an authentication system of WSP protocol is designed and implemented.The system is composed of supplicant module, authenticator module and server module. It builds a wireless Mesh network environment for protocol test with the features of the system, and then analyzes its performance.
Keywords/Search Tags:Wireless Mesh Network, Efficient Access Authentication, Protocol Implementation, Security Protocol
PDF Full Text Request
Related items