Font Size: a A A

Study On The Key Techniques For Security Communication Of Wireless Mesh Network

Posted on:2010-05-16Degree:MasterType:Thesis
Country:ChinaCandidate:M F ChenFull Text:PDF
GTID:2178360272478975Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
Wireless Mesh Network (WMN) is a novel broad band access network which has the merits such as huge capacity, high speed as well as wide cover range. However, WMN has its inherent security drawbacks which are similar to the WLAN and Ad hoc networks. Therefore, those security problems have great influence on the widespread application of WMN.This thesis focus on the key techniques which affect the security communication of WMN in terms of routing algorithms, key exchange algorithms in the authentication process and the crypto protocols. The main work and some conclusions in this thesis are as follow:Firstly, the security routing is concerned and the multi-path routing (MPR) algorithm is studied. Due to the restriction of route separation, the stochastic routing (SR) algorithm based on the transition probability is proposed and both MPR and SR are simulated under the circumstances of WMN. Simulation results show that SR outperforms MRP at the performance of standard deviation and highest interception ratio. Therefore, it means that SR algorithm enhances the routing security compared with MPR algorithm.Secondly, the crypto protocols such as Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA) and WiFi Protected Access II (WPA2) are discussed in details. Moreover, the encryption methods of these crypto protocols are compared in terms of Cipher Key, Size Key and Life, etc. Hence, different crypto protocols can be adopted by wireless mesh routers depending on different application circumstances.Thirdly, a wireless campus which is composed of WMN is simulated by adopting the OPNET software. Simulation results show the performance of wireless clients, wireless routers and server in terms of average load, average access delay and etc. This simulation of WMN gives an instinct reflection of the performance of WMN.Finally, this thesis is concluded and some prospects for the further works are given.
Keywords/Search Tags:wireless mesh network, network security, routing algorithm, key exchange algorithm, crypto protocol
PDF Full Text Request
Related items