Font Size: a A A

Wireless Network Security Key Technology Research And Analysis

Posted on:2007-11-04Degree:MasterType:Thesis
Country:ChinaCandidate:W Q YuFull Text:PDF
GTID:2208360185483021Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The security of the wireless network application became a choke point in the process of its popularization. In the year 1997, the wireless device manufacturers, including Nokia, Erickson, Motorola and Unwired Planet, constituted WAP forum. They aimed to bring forward a specification about wireless application protocol. In the framework of WAP, the protocol WTLS (Wireless Transport Layer Security) which is based on WPKI, is adopted to provide several security services in application level such as authentication, confidentiality and integrity. Lots of researchers focused on it and gave some excellent results, which accelerated the application and development of WAP effectively.The features of wireless communication include the finite bandwidth, the limited computing power and scarce memory of wireless terminals. However, the traditional Public Key Infrastructure can't work well without the support from Certificate and the Certificate Authority. The management and application of certificate are very expensive not only in establishing a CA but also in maintenance of CA. What is more is that it requires an environment of high level. It is impossible for the wireless communication situation with limited resources.Shamir inl984 first proposed the concept of identity-based public encryption. For the following 16 years the progress in this area has been rather slow. However, Boneh and Franklin developed an elegant Identity-Based Encryption system (BF-IBE) based on Weil Pairing on elliptic curves. BF-IBE represents a significant advance in cryptography. From then on, many experts focused on it and many good solutions were brought forward. Now it is an active field of cryptography. A straightforward purpose of using IBC is to simplify the complex management and usage of certificates in PKI. It is very constructive to the wireless communication environment that is impossible to support the certificates.The goal of this paper is to simplify the management and usage of certificates in wireless communication environment. And on second thoughts, it can make a...
Keywords/Search Tags:WAP, WPKI, IBC, IB_mRSA
PDF Full Text Request
Related items