Font Size: a A A

Study On Node Authentication Mechanism In Wireless Mesh Network

Posted on:2013-01-12Degree:MasterType:Thesis
Country:ChinaCandidate:J DuFull Text:PDF
GTID:2218330371459415Subject:Information networks and security
Abstract/Summary:PDF Full Text Request
As one kind of architecture where network nodes linked to each other through wireless link, wireless mesh network has the characteristic of high efficiency, high flexibility and high expansibility. It solved the problems of small coverage and hard to expand in WLAN, so it has a broad application space and development prospects. Meanwhile, the way of wireless link between nodes makes wireless mesh network facing more serious security problems. WMN security involves not only the user's access, but also the authentication between network nodes to ensure the security of WMN. Therefore, the authentication mechanism between the nodes and the authentication process has become one of the key elements in WMN security researching. Based on the analyzing the characteristics of WMN, the requirements of authentication between nodes and the defects of existing programs, this paper research the methods of improving authentication program and enhancing network security.Through the researching of existing WLAN authentication mechanism and authentication method in other fields, the802.1x authentication mechanism need the help of authentication server, which limits the distribution property of WMN. Share-key authentication has the shortage of inextensibility. WAPI also has some disadvantages, it doesn't have the function of identity protection, lacks of the verification to the user's private key and its key agreement is too simple. The authentication mechanism between the nodes in WMN is currently not perfect.Combined with the inherent characteristics of WMN and using the cryptography theory, the paper proposes a new authentication scheme suitable for WMN nodes. The authentication scheme uses the digital signature, message digest algorithm, AES and ECC to achieve the authentication between STA and AP, at the same time, ensures the confidentiality and integrity of messages.The paper uses BAN logic to verify its effectiveness and uses the OPNET to verify its feasibility. The results of logic verification and simulation show that the new authentication mechanism has good effective and efficiency.
Keywords/Search Tags:WMN, encryption, authentication, BAN logic, simulation
PDF Full Text Request
Related items