Font Size: a A A

Research On Security Charging Protocol In Heterogeneous Wireless Networks

Posted on:2016-05-28Degree:MasterType:Thesis
Country:ChinaCandidate:S G ChenFull Text:PDF
GTID:2208330461482978Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of wireless network technology and information society economy, the demands for mobile communications and broadband wireless access service are increasing. On the one hand, different wireless technologies, such as cellular UMTS, LTE, broadband wireless access technology (WiMAX) and short distance communication (WLAN) provide users with various services. On the other hand, with the dual-mode or multi-mode terminals increasing and the rising popularity of smart phones, PDA and other mobile terminals, users want to connect to the network with the best way by taking the advantage of heterogeneous wireless networks, experience a variety of network service and maintain the continuity of service. Therefore, the integration of heterogeneous wireless networks is a inevitable trend and the key piont of the next-generation networks. When users handover to the target network seamlessly, how to ensure the safety of billing is one of the most important issues in heterogeneous wireless networks commercialization. The main work is as follows:(1) Analyze the security of billing protocols for heterogeneous wireless network, including non-repudiation, fairness, confidentiality and accuracy.(2) Propose the idea of service division to design our billing protocol. Service provided by different network, such as, WLAN,3G, LTE and other network, is divided into many fragments, user needs to send a signed message of previous fregment to the network access point before obtaining the current fregment. Present a non-repudiable billing protocol based on self-updating hash chain for heterogeneous wireless network (NBPH). By using of the innovative self-updating hash chain, mobile station can update the hash chain quickly to ensure continuous fast authentication and billing. Then, improve NBPH by using a strong designated verifier chameleon hash signature algorithm to achieve non-repudiation billing and create a fair billing environment.(3) Security analysis of the designed NBPH protocol shows that the protocol has advantages of information confidentiality, non-repudiable billing and minimum loss of billing-value. Formal verification by AVISPA shows the proposed protocol can prevent disguise attacks, tamper attacks, replay attacks and other malicious attacks.(4) Performance analysis of the designed NBPH protocol by using of NS3 network simulation tool shows that the proposed scheme has advantages of low computation overhead, low communication latency which meet the performance requirements of heterogeneous wireless networks. Meanwhile, with the animation tool NetAnim, the datas stream of the billing protocol can be observed by the intuitive graphical interface.
Keywords/Search Tags:Heterogeneous wireless networks, Security, billing, Service division, Non-repudiation, Self-updating hash chain, Chameleon signatures
PDF Full Text Request
Related items