Font Size: a A A

Research And Design Of Integrated Security Access Technology For Broadband Wireless IP Networks

Posted on:2007-11-08Degree:MasterType:Thesis
Country:ChinaCandidate:K WangFull Text:PDF
GTID:2178360212983913Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
As various types of mobile clients becomes popular, the applications of broadband wireless networks develop rapidly because of its agility and convenient. The access technology is one of the important issues. How to access the broadband wireless networks securitly and quickly comes to be one of the main problems nowadays.The standard is not unified and the user has difficulty in accessing heterogeneous network, which causes many problems, such as difficult security management, inconvenient usage, complex device management and repeated investment.This thesis focuses on the security mechanism and integrated access authentication of the wireless networks. Firstly, we analyze the security features and requirements of WLAN. A survey of the current state of the security mechanism in the wireless broadband networks at home and abroad is presented. Security threat faced by the wireless networks and security methods employed by the relevant protocols are also analyzed.Secondly, comparative study of the wireless networks protocols and security mechanisms are carried out; including IEEE 802.11, the new generation WLAN security standard IEEE 802.11i, the broadband wireless access standard IEEE 802.16, our national standard WAPI, and the third generation mobile communications systems. It is also demonstrated that the authentication and encryption mechanisms specified by these standard cannot provide enough security guarantees to the wireless networks, such as one-way authentication, WEP protocol and static key derivation which may cause various kinds of attacks to the wireless networks.Finally, a new scheme of integrated authentication architecture for the wireless networks is proposed. It can implement the integration of the secure access authentication protocols and solve the problem of interconnection of authentication. With such scheme employed, the user can access wireless networks of various types adaptively. The implement of the scheme in Red Hat Linux is discussed in details. Simulations are done to test the scheme and the results shows that our scheme works well and can implement adaptive access to various networks protocols.
Keywords/Search Tags:broadband wireless networks, security protocol, integrated authentication scheme architecture
PDF Full Text Request
Related items