Font Size: a A A

ETAM-A Research On Authentication Protocol In Wireless Mesh Network

Posted on:2012-03-23Degree:MasterType:Thesis
Country:ChinaCandidate:D Y WangFull Text:PDF
GTID:2218330368488242Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless Mesh Network (WMN) is a new type of wireless broadband access network which has the advantages of high capacity, high speed as well as wide coverage. It's widely used Intelligent Transportation and Military Communications and many other areas and will be an ideal way of WLAN (wireless local area network). Similar to the other wireless networks, WMN also has all kinds of security issue. At the same time, the characteristics of multi-hop and self-organization of WMN also have their own security issue. Thus, it is an important task to develop an effective security mechanism to settle security threat of WMN.This paper conducts a detail study and a comparative analysis on the commonly used Wireless Mesh Network's authentication mechanism. It proposes a wireless Mesh networks authentication protocol ETAM which is based on EAP-TLS. The protocol applies to hybrid Wireless Mesh Networks, respectively made different authentication strategies for the backbone area and the client area of the hybrid Mesh. In the client area, the neighbor relationship mutual authentication is attached when the new node joins in, and after the first time authentication is successful, a session ID list will be established on the server side in order to complete the fast authentication. The mutual authentication on the neighbor relationship of the backbone routers is also attached to the backbone area certification. The protocol achieves mutual authentication between client and server, also between client nodes. It achieves the confidentiality and integrity protection of the multi-hop end to end data communication. It greatly enhanced the wireless Mesh network access security. Then it does a specific analysis for the performance of the authentication protocol, including security analysis and computational analysis. Succeeded in the simulation of the protocol, and analyzes the protocol's latency and packet loss rate. And compared the amount of communication and bit error rate of the protocols.Finally, a summary of the full text, the certification program this paper proposed greatly enhances the network security and reliability, the joined session ID list improves the efficiency of certification in a certain extent, it is still imperfect, but for promoting further Wireless Mesh Network development, improving the wireless Mesh network security and reliability, it has a reference value.
Keywords/Search Tags:Wireless Mesh Network, IEEE 802.11i, Authentication, EAP-TLS
PDF Full Text Request
Related items