Font Size: a A A

The Application Of M2M Authentication Using Identity Based Digital Signature

Posted on:2009-10-30Degree:MasterType:Thesis
Country:ChinaCandidate:X W ChenFull Text:PDF
GTID:2178360272990101Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of computer and communication science, the more complicated technology came with the more multiform communication. The ultimate destionation is making people to be able to transfer information any where at any time. However, while people were enjoying the convenience and flexibility of the smart mobile devices and wireless network, they were facing all kinds of security risks which came from the shortage of the wireless network and smart mobile devices. The identity authentication which is the first barrier of wireless communication and application is the most important line of defense in the wireless security area. Only the user who had passed through the identity authentication could benefit from the application services under the scope of the system authorization.Firstly, this paper introduced various identity authtication technologies and the identity based digital signature. Then it illuminated the security infrastructure of 802.11 wireless network and Bluetooth technology. According to the security properties and limitation of the smart mobile devices and wireless network, this paper concentrated and completed the following works:1. Based on the challenge-response mode, applied the digitial signature on the identity authencation between the smart mobile devices;2. Applied the identity based digital signature on the two-way identity authencation among the server and smart mobile devices;3. Implemented the computation application program interface of big integer on embed system;4. Reinforced the security of 802.11 WLAN and Bluetooth, through the identity authentication on application level.
Keywords/Search Tags:Smart mobile devices, Identity authentication, Wireless network
PDF Full Text Request
Related items