Font Size: a A A

Study And Implementation Fo Authentication Protocol For Personal Gateway

Posted on:2011-06-02Degree:MasterType:Thesis
Country:ChinaCandidate:J HuFull Text:PDF
GTID:2178330332988304Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Personal Gateway system (PG) contains a personal gateway in the centre, with some other terminals, such as 3G phone, smart phone, laptop or PDA for home application including multi-part video meeting, home surveillance, family member location, VOD and so on.Security issues in Personal Gateway system are analyzed in this paper, as well as the most basic and important security principles and methods. One password-based mutual authentication protocol and one public-key based authentication protocol for the 3G-Internet-Wi-Fi cross-platform communication system (PG) are given and implemented. Results show that the two Authentication and key agreement (AKA) protocols quanlify security requirements.Content of this paper includes:(1) Study and analysis of principle and design method for Authentication and key agreement (AKA) protocol.Architecture of the whole system is given.(2) Design of two AKA protocols for PG system. Weakness of password-based authentication protocol and CBC padding pattern is discussed, and a simple security analysis is presented. (3) Design of authentication sub-system including authentication automaton, security scheduler module. Secure data transmission is introduced. (4)Implementation of authentication sub-system.
Keywords/Search Tags:Personal Gateway, Authentication Protocol, Data Protection, Password
PDF Full Text Request
Related items