Font Size: a A A

Design And Implement Of Access Authentication In Universal Network

Posted on:2009-05-09Degree:MasterType:Thesis
Country:ChinaCandidate:X M ChenFull Text:PDF
GTID:2178360242466028Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The research of new network architecture is being raised for demands from users' growing diverse demands on the network and services, also has been the most important research item in the study of information network. For this, we propose the concept of universal network and pervasive service to support multi- network services, including the problems of creditability, mobility, sensor network access, and so on. This thesis researching is under this background.The Universal Network uses the mechanism of separation and mapping to solve the problems of mobility and security in the existing network. On the basis of analyzing existing authentication methods and mastery of the mechanism of separation and mapping, this thesis proposes a new method to finish identity authentication and message authentication, fixed-nodes and mobile nodes can safely access in universal network under this mechanism. This thesis mainly designs and implements a specific communication protocol among the three functional entities, authentication center, access switch router and terminal, to realize access control method in universal network to protect the privacy of subscribers.This thesis introduces the conception of authentication and five mainly authentication methods, describes the architecture of universal network and working principle of separation and mapping, discusses authentication scheme and implements the three functional entities using standard C language in Linux operation system. The scheme mentioned in this thesis has been tested in experimental environment, through analysis of the experiment result, the method described in this paper satisfies basically requirement of access control in the universal network, established a basis for our study to do the next research.
Keywords/Search Tags:Universal Network, Separation and Mapping, Authentication, Access Control
PDF Full Text Request
Related items