Font Size: a A A

The Research And Design Of WPKI Cross-authentication

Posted on:2011-06-10Degree:MasterType:Thesis
Country:ChinaCandidate:K LiFull Text:PDF
GTID:2178360305950883Subject:Systems analysis and integration
Abstract/Summary:PDF Full Text Request
With the developing of e-business and e-governments, people need the information security hardly. By modern cryptography theory and technique, The Wireless Public Key Infrastructure (WPKI) is a kind of important technique which implements network security in wireless area. It expenses the domain of traditional PKI technique. The WPKI technique could provide the service of the privacy, the integrity of authentication of identity, non-repudiation and the list goes on which play an important role in the network security. Nowadays with the development of WPKI, many banks and security companies have their own WPLI but almost no one could implement the data exchange between systems, just repeat the simple model. This could hardly satisfy the need form the society. This topic goes on this background.This paper is on the basic of achievements both at home and broad. We analyse deeply the trust models and the certificate models which are used publicly.We advance a new system of cross-authentication WPKI combined with the situation of domestic network. In this we discuss deeply how to combine the wired part and the wireless part of the bridge trust connection model of WPKI, and the network structure of concrete trust model. We also give the definition of data structure and some realization. Two thinking goes through this paper:1, compatible with current PKI system; 2, easy for implement. This paper has wonderful meanings to current cross-authentication WPKI system.In this paper, firstly we will introduce the system and the key technique detail of WPKI. Also the technique about WPAP based on WPKI will be researched. On the second hand, we will talk about the characteristic of traditional PKI trust model. Considering the particularity of wireless network, we will take the bridge trust model as our trust model in the WPKI system. Additionally, based on the system above, we search the detail of key part of WCA and bridge trust model. In the cross-authentication of WPKI, we create a new system which bridge technique to implement the cross-authentication. This technique could connect the users form different WPKI systems with a high efficiency. The technique in this paper all comply with the WPKI standard from WAP Forum, so it is trustable and authoritative.
Keywords/Search Tags:WPKI, WAP, WTLS, trust model, cross-authentication
PDF Full Text Request
Related items