Font Size: a A A

Research On Anonymity Communication Protocols In Mobile IP Networks

Posted on:2009-11-08Degree:MasterType:Thesis
Country:ChinaCandidate:C XieFull Text:PDF
GTID:2178360242490824Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the extensive application of computer networks, along with the requisition to net-system security from some special departments, Anonymous communications, because of its anonymity of the ID and relationship of the two communication parties, becomes the basic requisition of many on-line network applications and the popular research area for network security researchers.The development of wireless network technique brings great facility to people's life in recent years. Meanwhile, the popularization and application of wireless network technique has long been troubled by network security in wireless network. In order to provide more secure network communication service, we must pay more attention to the design of the network security scheme when we design a communication system based on wireless network. The design of authentication protocol is the foundation of the network security scheme.This thesis discusses anonymous communication techniques and anonymous authentication protocol in Mobile IP.Firstly, this thesis explicates the concept of anonymous communication protocols and the present state and realization technique of anonymous communications. It researches on the basic principle and realization technique and the research trend of controllable anonymity technology. Meanwhile, the thesis gives a brief introduction to the anonymity technology in Mobile IP network.Secondly, the thesis provides analysis and research of anonymous authentication protocol in Mobile IP network and points out their features, realization technique and the major problems. Accordingly, an improved scheme is proposed. The new scheme implemented the anonymity of Home Location Register (HLR) using Visitor Location Registers (VLRs) which had been employed to forward the authentication message by Mobile Station (MS). Through checking the authentication token, the improved scheme could control anonymity abusing. With the new message transmitting scheme and controllable anonymity scheme, the improved scheme enhances the safety and anonymity of the protocol.Finally, a brief security, anonymity and performance analysis on the revised protocol is presented. The analysis results show that the new protocol not only improves the anonymity of HLR but also defends anonymity abusing effectively.
Keywords/Search Tags:Wireless communications, Data privacy, Anonymous protocol, Controllable anonymity, Anonymity abusing
PDF Full Text Request
Related items