Font Size: a A A

Research And Implementation Of WIMAX Authentication

Posted on:2009-09-23Degree:MasterType:Thesis
Country:ChinaCandidate:Y T WangFull Text:PDF
GTID:2178360245986390Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of computer science and information technology, the mobilization of communication, the use of broadband has become a developmental trend. The emergence of WIMAX just meets the demands. WIMAX is a kind of new technology based on the standard of IEEE802.16 hadband wireless city network. However, because of the openness of wireless transferring channel, its security problem has been a focus in recent years, thus affecting the spread and marketing of this technology. Like other network system, the key issue in the construction of the WIMAX network is to guanrantee the security of information. While the user authentication encryption and information is the bases of guanranteeing the security of net system. Therefore, how to guarantee the safe authentication between customers of WIMAX and core net, to encrypt the data, to prevent the illegal access, unauthorized use and potential attacks are of great significance.The thesis first introduces the relative knowledge of wireless net and WIMAX, the research background and scope, then this thesis also describes various threat to wireless communication network, elicits the authentication technology based on, in addition, the popular password mechanism and logithism has been elaborated. The author of this dissertation, who takes various factors into consideration, has proposed and analysed the authentication mechanism of EAP-AKA and EAP-TTLS based on the standard of 802.11i and EAP authentication mechanism of 802.16e. Finally, the comparison between the two kinds of authentication technology has been drawn.Based on this, the author has put forward a whole set of model of end to end access model of WIMAX customer, and adequate evidence of the access process has been given. Furthermore, another key job in this thesis is to realize the aforementioned model, including the core element of this model-EAP module of authentication as well as the authentication mechanism of EAP-AKA; moreover, the author compares the results and the proposed process of the model of end to end, indicating the model is practical and feasible. This signifies that the proposed model can provide effective protection for the customer access of WIMAX.
Keywords/Search Tags:WIMAX, EAP, Wireless Network Security, Authentication
PDF Full Text Request
Related items