Font Size: a A A

Analysis And Implementation Of Access Control And Authentication In Wireless Mesh Network

Posted on:2008-11-13Degree:MasterType:Thesis
Country:ChinaCandidate:H Y YangFull Text:PDF
GTID:2178360212474543Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the rapid development of wireless networks, wireless mesh network(WMN) has emerged as a key technology for next-generation wireless networks .Wireless mesh networks are dynamically self-organized and self-configured, with the nodes in the network automatically establishing an ad hoc network and maintaining the mesh connectivity among themselves. Because of their advantages over other wireless networks, WMNs are undergoing rapid progress and inspiring numerous applications. By extending the coverage and bandwidth of 802.11 networks, WMNs have been focused by both researchers and enterprises.WMN is a robustness network, flexible and adaptable, which has advantage of being a backbone network. So a project of forming a backbone networks based on WMN is presented in this paper, aiming that a trustful backbone networks can be established to provide seamless connectivity between different networks. This backbone network can provide necessary services for both stations and networks.In backbone system, one of the most important services is authentication. There have been some researches on authentication in backbone system home and abroad. In this paper, a centralized authentication in WMN is designed and implemented through analyzing protocol and correlative code. Firstly, we introduce the background of WMN, including its features, development and standard draft. Secondly, we analyze the access control and authentication in WMN. Thirdly, design idea and architecture of access control and authentication in WMN is presented. Subsequently, the description focused on the design idea and implement method of access control and authentication was posed, then the emphases and difficulty of the implement got discussed in detail. Finally, we set up a test system for access control and authentication, and present the test results and final conclusion.
Keywords/Search Tags:Wireless Mesh Network, Access Control, Authentication, 802.11s
PDF Full Text Request
Related items