Font Size: a A A

Design Of Wireless Mesh Network Identity Authentication Scheme Based On Blockchain

Posted on:2020-06-18Degree:MasterType:Thesis
Country:ChinaCandidate:K ZhouFull Text:PDF
GTID:2428330602950375Subject:Engineering
Abstract/Summary:PDF Full Text Request
As a kind of wireless communication technology,wireless Mesh network has attracted more and more attention in recent years.It has the characteristics of wireless multi-hop,self-organization,self-repair and so on.It is easy to maintain and expand.These characteristics bring advantages to them,but also bring some security risks.When data is transmitted between multiple nodes through multiple hops,it is easy to be monitored and tampered by malicious nodes.Therefore,for wireless Mesh networks,it is crucial to ensure the security and credibility of each node in the network reasonably and effectively.Authentication is the foundation of network security.In order to make wireless Mesh network get more application and longer development,effective node authentication scheme is indispensable.At present,the related authentication used in wireless Mesh network can be roughly divided into centralized authentication and distributed authentication,both of which are improved on the basis of IEEE 802.1x or CPK,and have some limitations.In this paper,for the purpose of efficient and secure authentication of wireless Mesh network,a block chain-based authentication scheme for wireless Mesh network is proposed by means of block chain related technology and on the basis of block chain technology.The main contents include:(1)Using hybrid encryption to authenticate the signature of adjacent MP nodes and complete the exchange of the session keys.In addition,mutual authentication between adjacent nodes is realized,which eliminates the dependence of the traditional scheme on the central authentication server,and saves the relevant information after the time stamp is saved on the block chain,and broadcasts all nodes in the network for backup and preservation.The block chain technology is used to ensure that the security can not be tampered with.(2)Using the smart contract to code the authentication process,first traverse the network topology,the nodes on the traversal path use the hybrid encryption method for signature authentication,and the neighboring nodes on the remaining paths use the query block chain to complete the certification.For those nodes that have participated in the authentication,the authentication information will be stored on the block chain.Other nodes can determine their identity by querying the block chain,thus reducing the number of authentication between adjacent nodes in the network.Similarly,when the authenticated node moves in the physical location of the network and connects with other nodes or joins the network again,it does not need to authenticate any more.It only needs to query the block chain information to confirm the credibility of its identity,thus improving the authentication efficiency between adjacent nodes in the whole network.By building the Fabric block chain platform,configuring the environment and necessary installation packages,deploying the nodes on the platform,designing intelligent contracts and programming implementation,the scheme is verified.The experimental results show that the scheme is feasible and has certain advantages in security and authentication efficiency,which can adapt well to the changes of wireless Mesh network topology.
Keywords/Search Tags:Wireless Mesh Network, BlockChain, Smart Contract, Authentication, Security
PDF Full Text Request
Related items