| With the development of the communication technology and computer technology and the soaring flight of the internet technology, more and more computing devices and equipments such as servers, personal computers, notebooks, PDAs (Personal Digital Assistant)sprung up and swam into our life which could supply computing service and multimedia(audio, video, photo) service and so on. Because of the development of 4C (Communication,Computer,Consumer Electronics,Content) and Pervasive Computing and the expectation of people enjoying the service through the surrounding devices, the various heterogeneous devices interconnection became the trend. Concerning this situation, international organizations instituted many protocols. IGRS and UPnP are the two main protocols on which many manufacturers supported and developed thousands of different products based. Now, there are two main urgent problems to be solved: the first is to solve the devices interconnection between the heterogeneous protocols which makes people use these devices apparently and the second problem is to settle the security of the interconnection to ensure the secure usability service. Based on IGRS and UPnP device security connections, this paper did in-depth analysis and research on security interconnection. The jobs we did were as follows:1. The IGRS and UPnP protocols are analyzed and putting emphasis on construing the working mechanism and the security mechanism in their own internals.2. Concerning IGRS and UPnP protocols, this article did research on principle of work and security mechanism in IGRS and UPnP non-security pipe and summarized the hidden danger in non-pipe process. By combined with the two protocols, this article put forward a method based on the security pipe interconnection and set up a security protocol stack models.3. Based on IGRS and UPnP security stack, this article researched on security interconnection technology and illustrated the security stack working mechanism, security assurance and secure interface and so on. Using identity recognition, RSA, SHA-1 and DoS recognition and prevention module, we solved the five main security problems in success: disguise, replay, wiretapping, integrity and DoS. Finally, in the experiment, the result proved it worked to prevent network attacks from hacks to shield the security of the interconnection. |