Font Size: a A A

The Research Of Security Technology On The Lightweight TCP/IP Protocol

Posted on:2006-04-08Degree:MasterType:Thesis
Country:ChinaCandidate:G Q JiangFull Text:PDF
GTID:2178360185463803Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of network technology and electronic technology, mutual connection between various micro-devices such as embedded system and traditional network is becoming the fashion trend. It is very expedient for people to acquire and exchange information by using of inter-networking embedded system devices, and these devices can get wide application in the areas of intelligent transportation, information appliance, industrial control, environment inspection and so on.As embedded system is seriously limited by its resource and so was other similar device, it's not practical to transplant the traditional TCP/IP protocol into them. Thus, we need to reconstruct the traditional TCP/IP protocol to make it more suitable for resource limited devices. But the open network environment can not ensure the security of the connective system. If the security problem can not be solved better in the lightweight TCP/IP protocol, the security of the connective system is very easy to be threatened. Thus security of lightweight protocol is a big issue that needs to be solved in the lightweight TCP/IP protocol.This thesis introduced the background, significance and the current research condition firstly, and simply discussed the security protocol, various security arithmetic and the security architecture of TCP/IP protocol. Then the thesis put forward to a kind of security protocol based on trusted third party and a kind of lightweight IP layer security mechanism, and analysed them in details. We also evaluated the performance of the security mechanism with the network simulation tool NS2. Finally, the thesis summarized our work and pointed out the research direction in the future.
Keywords/Search Tags:Lightweight TCP/IP, Security protocol, Formalization analysis, Security mechanism, Network simulation
PDF Full Text Request
Related items