Font Size: a A A

Policy-based Self-regulating Wireless Network Security Model

Posted on:2011-04-08Degree:MasterType:Thesis
Country:ChinaCandidate:Z WangFull Text:PDF
GTID:2208360308466268Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Ten years ago, perhaps no one believed the Internet can be moved up, but now a variety of intelligent mobile devices are subtly changing the way people live. In the future, more disruptive innovation will be developed in virtual reality, information sharing and consumer electronics and other fields which is in the mobile terminal platform. Mobile terminal becomes more important in people's lives, it is becoming essential portable communications tool for daily lives. In this condition, the wirless network risks high level security problems. Unlike wired networks, wireless technique has an open architecture, this feature has brought us great convenience, in the meanwhile it also brought in a significant security issue. Although the research of wired networks have been very deep, because of the unique nature of wireless networks, the existing security mechanism in wireless networks can not perform well as it's expected.This thesis investigated the background knowledge of wireless networks, analysised security differences between the wireless network and wired network, studyed the existing dynamic network security model,concluded their pros and cons. And in the security model based on the combination of the special nature of wireless networks, wireless networks proposed a closed-loop self-regulating wireless network security model based on security strategy. The model is divided into three parts: detection and respons, security policy management, backup and recovery. Detection and response module detects wireless network traffic flow and intrusion response, security policy management module is responsible for the control of the entire model, backup and restore module is used for security policy and configuration, backup and recovery information for the model, and provids historical inquiry functions. The model is focused on faster wireless network topology changes, the flexibility of mobile terminals and mobility. The disadvantage of the existing network security model's poor adaptability is improved, and the network topology's change and the detecting unit's change can be detected and feeded back in real-time. The core modul self-regulating Filter generates a new security policy according to its input data and output data. In addition, the policy management components can also be self-regulating, it benefits the detection errors caused by human intervention, and the detection accuracy is improved. Finally, we use the SWARM simulation software to simulate self-adjusting filter to verify its feasibility and functionality, we also use the software to simulate the PPDR model simulation and self-regulating filter to do the comparison. The simulation comparison result also proves the validity of the model.
Keywords/Search Tags:wireless networks, self-regulation, security policy, model
PDF Full Text Request
Related items