Font Size: a A A

The Key Exchange Protocol Of BroadBand Wireless IP Networks

Posted on:2005-01-07Degree:MasterType:Thesis
Country:ChinaCandidate:C J CaoFull Text:PDF
GTID:2168360122980257Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Broadband Wireless IP network is the direction of network development in the future. Compared with traditional communication technologies, it has the advantages of high speed of data communication, good mobility etc. The development of IP network has brought the security problems. IPSec is the only one suitable solution for present security problems of all the Internet communications, it is also the most intact security scheme and easiest to be expanded, which can offer protection for any protocols (TCP, UDP, etc.) over IP layer. Because of the special security demands of the wireless network , IPSec faces some problems in wireless network applications, especially its key exchanges protocol, that is why we will discuss the key exchange protocol of broadband wireless IP network.The current Internet key exchange protocol IKE is too complicated to effectively prevent DoS attack and has too much rounds, which will influence the performance and interoperability and cause a lot of security hole at the same time. IKEv2 has simplified IKE to a great extent, for example, it reduced the interactional rounds greatly, deleted the parameter and authentication method that seldom uses and specified the action when the mistakes occur. But IKEv2 is still at the stage of draft at present, some content is still not perfect, and some defects exist yet while using in wireless IP network. On the basis of deeply analyzing the wireless IP network security threat and existing design requirement, we put forward the design requirements of key exchange protocol in wireless IP network. Based on these requirements, we propose an new key exchange protocol of wireless IP network - WIKE. The new protocol has solved two more outstanding problems in the wireless network: the active identity protection to the initiator and the peers can not deniable for the interaction between them. Also we has carried on the logic analysis and simulation to the protocol. The analysis results show: The new protocol is stronger than IKEv1 and IKEv2 on the security and is superior to IKEv1 greatly on performance.
Keywords/Search Tags:Key Exchange, Broadband Wireless IP, IKE, BAN Logic, NS-2
PDF Full Text Request
Related items