Font Size: a A A

Research On The Identity In Heterogeneous Wireless Integrated Networks

Posted on:2010-05-03Degree:MasterType:Thesis
Country:ChinaCandidate:E G LiuFull Text:PDF
GTID:2178330332478490Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
In wireless communication system, the real identity, current location and movement mode of user are important and sensitive information, and their confidentiality must be ensured. Especially, in heterogeneous wireless integrated networks, the key factor for attracting client is to protect the network information. Every identity can be used indicating the figure and location of each entity. But coupling relation and binding transfer of identity can result in divulging sensitive user information. The identity technology to avoid divulging sensitive user information has become a hot topic of research in communication field. In face of the complicated heterogeneous wireless environment, it's important but difficult to design a perfect identity technology.In view of above problem and security of heterogeneous wireless integrated networks, the related resolvent is proposed. A specific study is as follows.1. Through analyzing current identity technology of heterogeneous wireless networks and finding out the shortage, we find that the main cause of divulging sensitive user information, which is not only coupling relation but also binding storage and transfer of identity .2. This technology is consisted of two application strategies: separate storage of identity and substitution of identity. From the perspective of the identity, communicating process can be divided into four domains. Firstly, each entity's identity is ensured to be separately stored. Secondly, through utilizing the strategy about substitution of access identity, the security and credibility of user sensitive information could be improved.3. An integrated scheme of trusted connection based on identity is proposed. Specially, a trusted connection model based on identity would be designed. The model mainly contains a system framework of three layers: Identity Layer, Evaluation Layer and Authentication Layer. The function and work mechanism are designed concretely for Identity layer and Authentication Layer as to improve the credibility of network connection.4. The efficient algorithm of handoff and authentication based on identity was proposed. The method can effectively decrease the latency and protect the security of authentication.From the performance analysis and simulation, it can see that the new identity technology can improve defendable capability of sensitive information for user and network. It can improve the efficiency of trusted connection and handoff between heterogeneous networks.
Keywords/Search Tags:Identity, Heterogeneous Networks, Integration, Separate Storage, Replacing Transfer, Trusted Connection, Efficient Authenticaton
PDF Full Text Request
Related items