Font Size: a A A

Research On The Key Techniques Of Unified Identity In Heterogeneous Wireless Integration Networks

Posted on:2011-04-22Degree:DoctorType:Dissertation
Country:ChinaCandidate:X YangFull Text:PDF
GTID:1118330332978700Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The ubiquitous network is one of the important trends of currently wireless mobile communication network, in which heterogeneous wireless network integration is a hot spot issue. The paper relies on the national 863 project "Based on redundancy identifier a common credible access mechanism and the key technology research", and makes a thorough research on aiming at the problems of the unified user identity in heterogeneous wireless integration network, which has the strong theoretical exploration and the practical application value.At present, there are various network architectures and access technologies, and user identity information also has the great differences using in the network. If in the process of integration the same user still uses several different identity and different networks maintenance multi-authentication facilities together, then the access efficiency will be reduced largely, and it will reduce the security performance because of the short slab effect of several kinds of authentication mechanism.Therefore, based on the idea of the separation of identity, position and addressing information, the unified user identity design, authentication and handoff has been researched. The complete identity hiding and substitution mechanism has established, and the problems of the heterogeneous network and mobile terminal, such as the unified access, safe authentication, mobility have been soluted. The main research and innovation points as follows:Firstly, to build new identity application scheme in heterogeneous wireless integration network, namely the user's identity hiding and substitution mechanism, unified user access identifier, and build a complete mechanism of user identifier mapping relationship such as establishment, distribution, storage, update and so on.Secondly, borrowing ideas from the authentication and key agreement protocol of 3G, it improves the existence problems of the lack certification to authenticator and key plaintext transmission, and blends which into heterogeneous wireless network, builds EAP-TAKA based on identity hiding and substitution mechanism, unifies the access authentication plan in heterogeneous wireless networks, and takes applicants the formal analysis method to prove its correctness.Thirdly, focusing on the development trend of the certification agreement, the paper researches how to introduce EAP - TLS in heterogeneous wireless networks, and improves the exited security problems in the handshake process and the management frame plaintext transmission, and further enhances the unified authentication safety.Finally, combined with the characteristics of user identity and location identifier separation in project, the paper puts forward the handoff proposal based on identity hiding and substitution mechanism in heterogeneous wireless networks. It introduces mobile management from register, authentication and update such three aspects.Through the analysis and simulation, in heterogeneous wireless integration network, unified user identity, identity hiding and substitution mechanism, unified access authentication proposal and mobile handoff management are put forward in this paper, which can effectively solve the user sensitive information hiding, enhance the authentication protocol security in the largest degree, improve the security protection ability of user and network, and offer technology support for further solving the general credible access and seamless roaming problem.
Keywords/Search Tags:Unified Identity, Identity, Heterogeneous Networks, Integration, Authentication and Key Agreement, Mobile Handoff
PDF Full Text Request
Related items