Font Size: a A A

Research On Identity Authentication Mechamism Based On Mobile Business

Posted on:2008-09-18Degree:MasterType:Thesis
Country:ChinaCandidate:S H LiuFull Text:PDF
GTID:2178360212985180Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Value added services that mobile terminal access resources of wired network through wireless network are becoming diversity. It provides users with great convenience. Followed with security problems which restrict the quality of value added services are increasingly concerned with by users.Wireless media is easier become the target of attack than fixed media. Therefore domestic research on security of the mobile network technology has risen in recent years. Many researchs focus on data link layer, however, the security of value added service in application layer is also needed. Identity authentication is not only very important but also the most basic service in security system. Generally, capabilities of calculation and capacity of memory in mobile terminal are limited, Existing protocols or encryption algorithms on application layer are complex, therefore mobile application needs a light solution.In view of above question, the author conducts the analysis and research on the theory of identity authentication, mainly completes the following work:1. Combining the needs of mobile business, a light authentication model is proposed.The model is simplified based on kerberos protocol, which made itself suitable for capabilities of mobile terminal. It is efficent for authentication.2. Elliptic curve cryptography is very suitable for wireless environment that has been introduced in the model.The model has a further improvement of security than kerberos protocol based on algorithm of DES.3. BAN logic theory has been used to prove the completeness and validity of the model. The model has been implemented, and applied to information platform of mobile bussiness.Conlusion and achievements obtained in the thesis are significant regarding the improvement of security of mobile application service.
Keywords/Search Tags:Mobile business, Network security, Authentication, Kerberos, Elliptic curve cryptography
PDF Full Text Request
Related items