Font Size: a A A

Study Of Effective Access Authentication In WLAN

Posted on:2007-12-15Degree:MasterType:Thesis
Country:ChinaCandidate:J WangFull Text:PDF
GTID:2178360182478070Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
WLAN is the product of the combination of computer Internet and wireless communication technology in the 1990s. It accesses network with wireless channel. WLAN provides some substantial tricks to the communication mobility, personal and multi-media using IEEE 802.11. It is developed from Ethernet among kinds of WLAN standards. Since it is simple and reliable, IEEE 802.11 is supported widely. It becomes the focus, because its fastest data processing is 11-54 Mbps which would support most of the network presently.At the same time, the needs of mobility data communication are increasing. People are not satisfied with the limitation of mobility area, which is provided by the single access point, when they access WLAN. It is proved be a main point that how to handoff machinist through MAC layer to expend mobility area and ensure the data of communication.However, how the handoff is accomplished is not defined in the 802.11 protocol, It only gives logically that a handoff of a MN be devised into 3 sections. They are discovery process, reauthentication process, reassociation process. With the experimental analysis this logical process, a lot of researching results suggest that the MAC layer handoff delay is almost 90% present of the total delay That is to say, the effective way in reducing the MAC layer handoff delay in the MN's handoff process would improve the performance of handoff greatly.Following the reasons above;the paper is mainly about the research on the fatal technology and mechanism in authentication process in handoff Based on the deeply analysis and result on the present IEEE 802.11i, the author provides an improved algorithm which the authentication keys involving the context information of handoff are pre-distributed through APs' neighbor graphs.In order to analysis the performance of the improved solution, the author set up an test environment which can test the new solution and collect the related data Finally, the detailed figure is provided to illustrate the improvement compared with the traditional one.
Keywords/Search Tags:Effective Authentication, Movement, 802.1x, 802.11i
PDF Full Text Request
Related items