Font Size: a A A

Study Of The Identity Authentication Of Manets-Cellular Fusion Network

Posted on:2012-05-16Degree:MasterType:Thesis
Country:ChinaCandidate:J H ZhangFull Text:PDF
GTID:2178330332995309Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
Applying identification certification to nodes requesting to join the networks prevents unauthorized users from getting access to or using networks resource, thus is one important aspect of diverse networks safeties and the basis of other kinds of safeties. In MANETs-cellular mixed network, terminal nodes of MANETs network have the feature of mobility whose direction and trend is unpredictable and the nodes may join or leave network at any time, therefore are easily seized by lawbreakers. Since data are transmitted through unsafe wireless channel in networks and communication content is easily intercepted in communication process, applying identification certification to nodes requesting to join the mixed network and networks nodes in the process of communication is very necessary.In MANETs-cellular mixed network, in view of bad communication ability and limited energy, bandwidth and storage ability of terminal nodes in MANETs network, certification algorithms that have high complexity and masses of calculation shouldn't be adopted. By bringing in and improving AKA certification mechanism used in cellular network ,this paper completed identification certification of nodes in MANETs network. This mechanism provides functions of data source certification, data completeness, escape reply attack, confidentiality protection and so on. dentification certification and data encryption Plans utilizing AKA single-key mechanism have the features of simplicity, high efficiency, convenient deployment and implementation. AKA certification mechanism adopts single-key certification, which have short secret key, algorithms with low complexity and high safety, therefore is suit for mixed network. Then we applied formal proof to this plan,proved through analysis and deduction that this plan is safe in the two-way certification process of"Network to Peer"and"Peer to Network"and is practically feasible。By deploying certification servers in cellular network, we applied concentrative certification to the identifications of MANETs networks nodes and the certification process is efficient, safe and easy to manage.On the basis of analysis of network safety problems in MANETs network, especially the identification certification problem, and the research on AKA certification protocol , this paper improved AKA certification protocol and introduced it to mixed network。Through scene setting and service deployment, we determined our network environment of improved plan. Through such certifications as getting access to network certification, two-way certification and Heavy certification, we analyzed the feasibility of AKA certification protocol. Through such attacks types as escape reply attack, Man-in-the-middle attack, DoS attacks and Limited expressly attack, we illustrated the robustness of application of AKA certification protocol in mixed network.The prevention of several certification processes and attack types fully illustrates that applying AKA certification protocol to mixed network is practically feasible, safe and dependable. Steady identification certification mechanism will bring a safe and dependable service environment to networks.
Keywords/Search Tags:Cellular Network, MANETs, AKA Mechanism, Authentication
PDF Full Text Request
Related items