Font Size: a A A

Research On Wireless Mesh Network Access Authentication Based On The Identity Signature Mechanism

Posted on:2015-03-03Degree:MasterType:Thesis
Country:ChinaCandidate:Y L SiFull Text:PDF
GTID:2268330431954465Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In recent years, wireless networking technology, especially the wireless Mesh network technology, develops rapidly. Wireless Mesh networks are product of the combination of self-organizing wireless LANs and mobile network, with features of high-speed, self-organizing, self-healing and covering a wide range. It is considered to be an important next-generation wireless network communication technology, and has very broad prospects for development and research space.Like traditional wireless networks, Wireless Mesh Networks faces enormous security challenges. Wireless data communication between nodes expose in wireless channels, and wireless nodes limit in storage and computing capabilities, both making the need to protect the security of wireless Mesh network protocols. How to quickly and efficiently secure access between nodes of Mesh network and node mutual authentication, which is the content wireless Mesh network authentication protocols focus on. To the traditional IEEE802.11access authentication mechanisms, digital certificate management is a heavy burden for the wireless Mesh network for this architecture and there are denial of service attack, middle attacks and other security risks. Combining the characteristics of wireless Mesh network, research new access authentication scheme is necessary.Based on the study of several existing wireless Mesh network security protocols above, identity-based cryptography, we propose a new wireless Mesh network access authentication scheme, the implementation process of the program made a detailed description, a detailed analysis security of the scheme, and made a performance comparison with traditional solutions. Based on this scheme, design key update and revocation policies.
Keywords/Search Tags:wireless Mesh, access authentication, identity signature, key management
PDF Full Text Request
Related items