Font Size: a A A

Analysis And Implementation Of Access Authintication Mechanisms Based On Identity For 3G-Wlan Interworking Network

Posted on:2011-06-26Degree:MasterType:Thesis
Country:ChinaCandidate:W F XuFull Text:PDF
GTID:2178330332465275Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Research in the field of information security, which mainly includes data confidentiality and authentication technology. Data confidentiality mainly depends on encryption technology and key exchange protocol, and Authentication technology mainly depends on digital signature technology and authentication protocol. Generally speaking, the Key Management Center defines the key exchange is called centralized way, and u themselves define the digital signatures is called decentralized way. Before the encryption, we need firstly to obtain the other's public key, so how to obtain the other's key is critical. While the digital signature is different from this method, the signer can send signature information together with the public key which is used to verify the signature information, to verify the signature information directly. In that logic, we need to identify the key binding relationship, though authenticity of the trusted root's reality become critical.Heterogeneous network convergence is the development trend of the next generation networks, and identity is a measure that uniquely identifies the user entity; Authentication system is the base of building traded trust and data security, the core of which is to build a kind of Reasonable Signature Mechanism. CPK algorithm is based on identity and the public key algorithm, which solves the key topics of scale and direct authentication. In this way, based on the identity of the authenticated entity, we research the authentication protocol in 3G and WLAN interconnection network, which will have great practical significance. Research includes: analysis of advantages and disadvantages of the current variety of wireless network access authentication; improve and simulate the EAP-AKA protocol of 3G-WLAN; design a protocol based on identity for 3G-WLAN network.To improve the existing EAP-AKA protocol and Simulation with OPNET and OpenSSL: to encrypt the session key with the random number to enhance its security; to realize the direct certification of any entity identity with CPK algorithm; Non-repudiation security; to realize the re-authentication locally; to design a variety of interfaces such as encryption and decryption, and signature algorithm; to build the simulation environment with the abstract entities.This paper designs a protocol which based on identity for 3G-WLAN network, analyzes the safety of the protocol; This protocol is based on CPK algorithm with large-scale certification, simplicity of the verification and management effectiveness. So this protocol has universal and practical application value.
Keywords/Search Tags:3G-WLAN, Access Authentication, CPK, OPNET, OpenSSL
PDF Full Text Request
Related items