期刊文献+

利用P2P技术实现移动终端在WLAN内的漫游认证

Station roaming authentication solution in WLAN based on P2P
下载PDF
导出
摘要 针对IEEE802.11i协议中身份认证和主密钥协商造成认证时延过大的问题,提出了一种利用P2PChord技术管理无线局域网(WLAN)内认证信息的认证优化机制.站点在首次接入WLAN时将协商生成的认证信息发布至P2PChord环中.当站点在接入点(AP)间发生切换时,可从P2PChord环中查找出相应的认证信息以完成后续的协议交互,无需通过认证服务器重新认证,从而显著降低复杂认证引起的时延.理论推导及实验结果表明:该认证信息管理方案能够降低站点在AP间的切换时延,满足实时应用通信质量的需求;同时还可以减轻认证服务器的负担,在一定程度上防止单一故障点的存在. To avoid the large authentication delay of IEEE 802. 11 i protocol for identity authentication and key agreement, an authentication optimizing mechanism based on peer to peer (P2P) chord technique is proposed. When the station joins the wireless local area network (WLAN) for the first time, it can send the authentication information to the Chord ring and find the authentication information between access points (APs) to finish the subsequent interaction of IEEE 802. 1 1i protocol. Without recertification, the solution reduces the authentication time of the complex authentication. The theoretical and experimental analyses show that this mechanism can reduce the handoff delay and satisfy the requirement of real-time applications. Besides, it can also lighten the burden of authentication server and avoid a single point of failure to a certain extent.
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2009年第5期909-912,共4页 Journal of Southeast University:Natural Science Edition
基金 国家自然科学基金重大研究计划资助项目(90604003) 国家自然科学基金资助项目(60603067)
关键词 无线局域网 IEEE802.11i认证 P2P 快速切换 wireless local area network IEEE 802. 1 1i authentication peer to peer (P2P) fast handoff
  • 相关文献

参考文献9

  • 1IEEE 802. 11 Wireless LAN medium access control (MAC) and physical layer (PHY) specifications[ S ]. 2007.
  • 2Matthew G. 802. 11 wireless networks the definitive guide[M]. 1st ed. Beijing: O'ReiUy,2002:105 - 112.
  • 3IEEE 802. 1 x Port-based network access control [ S ]. 2001.
  • 4Rigney C, Willens S, Rubens A, et al. RFC 2865 Remote authentication dial-in user service (RADIUS) [S]. 2000.
  • 5IEEE 802. 11i Draft supplement to IEEE Std 802. 11: specifications for enhanced security [ S ]. 2006.
  • 6Artur H, Erik O. Compass: decentralized management and access control for WLANs [C ]//IEEE International Conference on Personal Wireless Communications. Colmar,France ,2005 : 106 - 109.
  • 7Mishra A, Shin M H, Petroni N L, et al. Proactive key distribution using neighbor graphs [ J ]. IEEE Wireless Communication ,2004,11 ( 1 ) : 26 -36.
  • 8Maccari L, Fantacci R, Pecorella T, et al. Secure, fast handoff techniques for 802. 1 x based wireless network [ C]//2006 IEEE International Conference on Commu- nications. Istanbul, Turkey,2006 : 3917 - 3922.
  • 9Stoica I, Mirris R, Karger D, et al. Chord: a scalable peer-to-peer lookup service for internet application [ J ]. Computer Communication Review, 2001,31 ( 4 ) : 149 - 160.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部