Font Size: a A A

Research And Simulation On Key Technology Of Wpki

Posted on:2005-10-09Degree:MasterType:Thesis
Country:ChinaCandidate:S M YangFull Text:PDF
GTID:2208360125964186Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
In this paper, we mainly discus WPKI principle, system infrastractrue and the simulations of it's key partses. Because the interface of air in wireless world is openned, security in the M-Commerce is more important than in wired world. M-Commerce will just succeed with expand only when all customers make sure cheat or distort cannot take place in a bargain process in wireless world and the bargain can be acknowledgement by the law with the protected privacy. Public Key Infrastructure is one of very important safeguard for E-Commerce in wired world. Because of guaranteeing the information security, identity authentication, information integrity and nonrepudiation, PKI got the widespread approbation. As a result,the concept of PKI, process of security operation, key , certificate...etc also can be used to solve the security problem in M-Commerce. Based on PKI and considerated the feature of wireless M-Commerce, WPKI( wireless PKI) technique satisfies the security demands in M-Commerce in with: confidentiality, integrity, reliability, nonrepudiation.The main contents of this research includes: research WPKI system infrastructure; Establishing the simulation platform for WPKI; simulate the key parts of WPKI( such as: PKI Portal, WPKI CA, catalogue server, WAP Gateway); research WTLS certificate construction, WPKI Portal, certificate URLs etc; simulation of WTLS protocol. We hope our research can achieve two objectives as follows:1. Find the optimal profile for the key parts of WPKI through the simulation under given condition. 2. Puts forward suggestion for actural system.The research work is divided into two phases. First, we will go deep into the research objects include the infrastructure of WPKI, and WTLS protocol; Secondly, proforming the simulation and the analysis of proformance. The methods of research as followed:Research of WPKI infrastructure base on related international standard. Study functions and effects of WPKI portal: basic function of RA(); the protocol and message between CA and client; handle the certificate request from client according to the register policy of PKI. Study the key techniques of WPKI; Study several algorithm of encryption and signature; Study the WPKI CLR mechanism.System Modeling. Because the core issue of discrete event system is simulation modeling, the defination of activities of entities in system is indispensability.Determine the simulation algorithm. There are two questions about the algorithm. first of them is how to generates the random variables; the second is the how to simulate the discrete event system, that is what is the simulation policy. Analysing the simulation results. We have to make sure the results of simulation is close to real value by control the time of simulation process, because every result of single simulation process only is a sample from system model.So far, the research of WPKI, simulation of WAP gateway and WTLS protocol have been done. With these research and simulation, we believes the results of the works are valid as a whole and can be refered to largely by real system.
Keywords/Search Tags:WPKI, WTLS, WAP, Simulation, M-Commerce
PDF Full Text Request
Related items