Font Size: a A A

Anonymous Authentication Protocol Design, The Mobile Internet

Posted on:2009-04-05Degree:MasterType:Thesis
Country:ChinaCandidate:J ZhangFull Text:PDF
GTID:2208360272473049Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the quickly development of the information network technique, especially the appearance of some new networks continuously, people are no longer contented with the use of fixed terminal or single move terminal to link Internet. The wish to use mobile subnet (such as the network of marching army, flying aircraft, sailing steamboat, running car and train) in a kind of stabilize and dependable way to obtain information from the Internet state dynamically flourished. This urged the evolvement of the wireless Internet to Wireless Mobile Internet. Because of the mobile node, access point and router may be in motion unceasingly. When an MN moves from its home networks to a foreign network, the foreign networks should perform authentication, authorization and accounting for the MN. So the mobility in these networks requires AAA protocols. And once AAA protocols and infrastructures appear, they will drive the implementation of Wireless Mobile Internet in economical aspect. So it is necessary for Wireless Mobile Internet to combine with AAA .Plus, because of open and malicious node indeterminism in Wireless Mobile Internet, the privacy of the network user be subjected to illegally eavesdrop more easily. An adversary can gain knowledge about not only the content of the files being transferred but also the identity of sender and receiver of the files. However, the best method of solving the privacy protection is an anonymous technique which has the important theory and realistic meaning to study the anonymous technique in Wireless Mobile network.Based on the previous anonymous technologies, the paper researched the request of safe correspondence, analyzed characteristics of Wireless Mobile Internet and its anonymous requiring. There are two key contributions in this paper:(1) Designing and studying an Anonymity Wireless Mobile Internet authorization protocol. This protocol uses public key authentication program based on identity, which carries on the authentication in the way of single-time public key and makes sender anonymous. And then we analyze and study security of protocol.(2) Leading AAA and PANA protocol into Wireless Mobile Internet, we put forward an authentication protocol which independence accessing of network low level and network topology architecture. The protocol uses public key authentication program based on identity, we lead anonymous into authorization protocol of Wireless Mobile Internet, carried out the mutual authorization between a customer and AP. The reality which promises the correspondence of both parties' identity can believe. And then we analyze and study security of protocol.
Keywords/Search Tags:Wireless Mobile Internet, Anonymous Authentication, AAA Protocol, PANA Protocol
PDF Full Text Request
Related items