Font Size: a A A

Research On The Authentication And Key Agreement For Heterogeneous Wireless Network Interworking

Posted on:2007-10-18Degree:DoctorType:Dissertation
Country:ChinaCandidate:J JiangFull Text:PDF
GTID:1118360185497257Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The rapid progress of the wireless network technology has a wide influence on the people's traditional life and work. Some new applications based on the new wireless technologies are altering the custom and style of the people's life, and bringing us more and more experiences.Currently, the existing various wireless networks, such as WLAN, Bluetooth, GSM, CDMA and UMTS, are designed for specific service requirements. None of the existing wireless systems can simultaneously satisfy the requirements of the future mobile communcaitions and pervasive computing. The development of future wireless network must be towards the core network with IP, and the convergence of the various wireless access technologies. It can thus provide users anywhere and anytime access to high-speed data real- and non-real time multimedia services.It is very complicated to implement the heterogeneous wireless network convergence. How to solve the security problems is the key step toward the successful heterogeneous convergence. In spite of the security limits existing in the current homogeneous wireless networks, which may influnce on the future heterogeneous wireless convergence, heterogeneous wireless network interworking will be faced with further security problems because of the complexity of system and management.This dissertation mainly studies on the authentication and key agreement of future heterogeneous wireless convergence, including access authentication, inter-domain vertical handover authentication, and the session key agreement. It is the basic precondition and building block for the secure communication of the heterogeneous convergence, and also it is the research hotspot now. The authentication and key agreement mechanism can prevent unauthorized user from accessing the network, resist malicious network to deceive the lawful user, encrypt the session data by using the exchange key, and provide the identification of the data origination.Currently, heterogeneous wireless network interworking is paid more and more attention. Some standard and project organizations are investigating the heterogeneous wireless convergence issues. However, few works about the access authentication and vertical handover authentication are carried through. Some results...
Keywords/Search Tags:Heterogeneous wireless network, Authentication and key agreement, Vertical handover, Provable security, Proxy signature, Bilinear pairing, Hash chaining, Diffie-Hellman, Identity-based encryption, Canetti-Krawczyk model, Bellare-Rogaway model
PDF Full Text Request
Related items