Font Size: a A A

Research Of Authentication Framework And Key Based On IIEDNS

Posted on:2011-10-17Degree:MasterType:Thesis
Country:ChinaCandidate:Q WangFull Text:PDF
GTID:2178330335460111Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As long as the popularization of the computer and the development of the Internet, network office and a lot of applications of computer have already been indispensable tools in our life. As the scale of Internet users has been grown rapidly, the information of users'identity become more complex. However, it would be a extremely urgent problem that how to ensure legal users to access resources conveniently and safely, and how to get them quickly and efficiently.As the extensive concern of IOT, we would describe a new concept: IIEDNS(Identity & IP based on Event DNS). A effective platform for data exchange and sharing, using for interconnect between different systems, departments or services. It only stores the objects, facilities, event codes, services IP. On an effective and safe authentication framework, users can access their public services.In this paper, it would describe a new authentication framework based on this security problem. As the development of network technology, the security issues has been more and more serious. Aiming at this problem, we would describe a authentication framework based on IIEDNS in this paper. The IP has been paid the utmost attention, and would be identified. According to this, the security would get greatly enhanced.On the other hand, it would need a single authentication system in each application subservice to access the data or service in common. This management method exposed a lot of problems. The most typical one is efficiency. That means each users has to create an account and password for each subservice which brought great inconvenience.There are much technology on this problem, and the directory service technology would be the most typical one among a lot of solutions. After the deep research on directory service technology, we would describe an authentication framework for the need of IIEDNS in this paper.At last, the method of designing the authentication framework has been proven by scientific theories using BAN logic. And the simulation of the authentication procession had been completed in NS2 environment.
Keywords/Search Tags:iiedns, ldap, authentication, directory service
PDF Full Text Request
Related items