Font Size: a A A

The Design And Implementation Of Non-redundant Identifier Scheme For Heterogeneous Wireless Integrated Networks

Posted on:2011-11-05Degree:MasterType:Thesis
Country:ChinaCandidate:H J YangFull Text:PDF
GTID:2198330332978430Subject:Military communications science
Abstract/Summary:PDF Full Text Request
In heterogeneous wireless integrated network, each wireless network has unique identifier scheme. The variety and redundancy of identifier has bringing a series of potential security problems. It is important to design a scheme, which can meet of security demand of heterogeneous wireless integrated network. Therefore, the workgroup have proposed a method to solve the redundancy with identifier's separating storage and replacing transfer mechanism. But they have not presented a specific designing and realizing scheme, and even considered little about the feature of heterogeneous wireless integrated network.Based on the former achievement of this workgroup, considering the security demand of heterogeneous wireless integrated network, this paper proposed a detail non-redundant identifier scheme and realized it. The main contents are outlined as follows:1. The redundancy identifier in heterogeneous wireless integrated network is analyzed. According to heterogeneous wireless integrated network security requirements, this thesis analyzes the redundancy characteristic of identifier in number, content, storage, and usages, and points out that the main reason of leaking secret information is the nature redundancy of identifier.2. A non-redundant identifier scheme has been designed, and paid more attention to the definition, storage, replacing transfer and updating mechanism of identifier. With those mechanisms, it will solve the potential security problems form the root. This scheme mainly has four characteristics: (1) Defines a unified identity for different access networks to solve the redundancy in number and content; (2) Designs a distributing and storing mechanism, which can reduce redundancy in storage; (3) Designs a replacing and transferring identifier mechanism to solve the redundancy in usage; (4) Designs updating mechanism for temporary identifiers to increase its fresh demand. The analyzing result indicates that this scheme can protect user's secret information effectively.3. This paper has built an experimental platform for the access authentication of heterogeneous wireless integrated network, and implemented the scheme, meanwhile, tests and analyzes the identifier mechanism. The implement scheme has the following main features: (1) Built one unified experimental platform; (2) Designed a double keywords hash structure to store the identifier for mapping and querying. The experimental results show that the scheme can enhance the protection of user's secret information and works well, which indicates that this scheme meet the need of security demands of heterogeneous wireless integrated network.
Keywords/Search Tags:heterogeneous wireless integrated network, identifier security, Non-redundant identifier, replacing and transferring, identifier updating
PDF Full Text Request
Related items