Font Size: a A A

Access Authentication And Key Management Of Wireless Mesh Networks

Posted on:2008-09-15Degree:MasterType:Thesis
Country:ChinaCandidate:Y XuFull Text:PDF
GTID:2178360212474657Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
As an emerging technology for last-mile broadband access, Wireless Mesh Networks (WMNs) has been increasingly popular with people for the advantages of high frequency efficiency, large cover field, excellent expansibility and strong reliability. In WMNs, each user node operates not only as a host but also as a router. User packets are forwarded to and from an Internet-connected gateway in multi-hop fashion. Despite the recent start-up surge in WMNs, much research remains to be done in standardizing the functional parameters of WMNs to fully exploit their full potential and the security in WMNs is still in its infancy without well definition or criterion as very little attention has been devoted thus far to this topic by the researcher.In this paper, we address Mesh network security including key management, access authentication, and data protection in a multi-hop mesh network. The main work we do here is as follows:1. On the basis of the feathers of mesh networks, an efficient distributed key management is proposed for the backbone wireless mesh and a key management with center is proposed for the client Mesh of hybrid wireless Mesh .2. An access authentication based on 802.1x is proposed for the authentication of a new client joining a Mesh network. The process of the access authentication which take the mesh structure into account are particularly described. In addition, the security of this scheme is analyzed.3. Another secure authentication technique is introduced, which will be more fit mesh structure of ad-hoc nodes forming clients of an integrated WMN. More precisely, EAP-TLS over PANA is proposed and discussed in a multi-hop mesh network, and a security analysis is provided.
Keywords/Search Tags:wireless mesh, access authentication, key management, wireless mesh security
PDF Full Text Request
Related items