Font Size: a A A

Design And Realization Of End-to-End Security Solutions Based On J2ME

Posted on:2009-02-25Degree:MasterType:Thesis
Country:ChinaCandidate:Y J CaoFull Text:PDF
GTID:2178360278464158Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the highly integration of internet and mobile communication technologies, the m-commerce has emerged. Because of the limitations of wireless channels and mobile terminal equipments, the problem of security issues of m-commerce which should be addressed in practice becomes very important. Therefore, it is of very importance to design and implement an end-to-end security strategy which can guarantee not only the security of resources at both ends but also the data transmission in the network.With the combination of elliptic curve algorithm and access control strategies, a J2ME-based end-to-end security strategy is proposed. According to the basic principles of safety and convenience,the overall framework of the security strategy is designed,the classification and the design of modules for both clients and server are presented,the specific functions and workflows of each module are described.Based on the analysis of the disadvantages of elliptic curve encryption algorithm and the RBAC1 module, the end-to-end security strategy improves the elliptic curve encryption algorithm to avoid encoding the plaintext to be a point on the elliptic curve. By the use of the resource management at different levels and the establishment of private resources,the RBAC1 module is extended, which improves the flexibility of authorized system and reduces the workload of the administrator. The end-to-end security strategy describes the implementation of the modules of network transmission, parameter storage and the structure of the database. The authentication method which can use encryption algorithm to encrypt passwords and prevent illegal users from pretending each ends of channel consists of digital signatures and password authentication.The results of simulation show that the J2ME-based end-to-end security strategy don't need to change any structures of underlying network,and assures the security of data in network.
Keywords/Search Tags:Eccliptic Curve, Data Encryption, Access Control, Authentication, Digital Signature
PDF Full Text Request
Related items