Font Size: a A A

Research And Design Of Authentication Protocols Based On Fuzzy Logic

Posted on:2013-06-14Degree:MasterType:Thesis
Country:ChinaCandidate:Y SuFull Text:PDF
GTID:2248330371467412Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Authentication is an important mechanism for network security, which provides basic security guarantee for security services. But there are still several defects in authentication protocols, so they are vulnerable to various types of attacks.This paper selects two common authentication protocols Kerberos and CHAP, analyzes the security defects in their process, and proposes the idea of using fuzzy logic to improve the security of authentication protocols. By comparing the traditional solutions improving the security of the two authentication protocols respectively, this paper designs the improvement of Kerberos and CHAP protocols based on fuzzy logic which contions the design of protocol’s architecture, process and fuzzy controllers. The method of using fuzzy logic can assess the potential threats and take appropriate measures to prevent and suppress the potential attacks, so that it improves the security of authentication protocol.
Keywords/Search Tags:Authentication, Kerberos Protocol, CHAP Protocol, Fuzzy Logic, Fuzzy Controller
PDF Full Text Request
Related items