Font Size: a A A

Study Of Cross-domain Access Authentication Technology In Heterogeneous Wireless Networks

Posted on:2012-07-02Degree:MasterType:Thesis
Country:ChinaCandidate:Z W ZhangFull Text:PDF
GTID:2248330395455562Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Heterogeneous wireless networks integration is an inevitable trend in thedevelopment of the next generation wireless networks. Standardization organizations,such as IEEE,3GPP and so on, respectively have formulated their security architecturefor wireless integration networking, and they have designed related security accessmechanisms for different networks integration scenes. However, heterogeneousmulti-domain wireless networks are facing great security challenges, because of thecharacteristics, like cross, overlap and domain elements’ dynamic changes of themultiple security domains. This paper analyses the security threats and studies thesecurity access technology in the heterogeneous multi-domain wireless networks,details as follows:1) This paper deeply analyses the heterogeneous wireless networks integrationschemes formulated by3GPP, IEEE and etc., indicates the problems on thecompatibility and expandability, and then designs a general heterogeneous wirelessnetwork model, abbreviated to GHWNM. This model can be compatible with existingnetworking technologies, finish the heterogeneous networks integration without impactson users, and be useful to improve the application and popularization of heterogeneouswireless networks.2) This paper analyses the security requirements and security mechanisms in the3G-WLAN, IEEE802.21, ambient networks and IMS. This paper designs theheterogeneous wireless access security model based on GHWNM. And this securitymodel defines the duties of each entity and the relationships between entities, at thesame time it meets the access security requirements, like users management, identityauthentication, key agreement and accounting.3) This paper deeply analyses problems in the traditional heterogeneous wirelessnetworks access authentication, designs a CPK-based heterogeneous wireless networksaccess authentication protocol, CHWNAAP in short, by using the mass key space andoff-line authentication characteristics of CPK. CHWNAAP meets the requirements ofheterogeneous wireless networks access authentication, such as large-scale usersmanagement, identity anonymous protection and security accounting. The efficiencyand security of CHWNAAP are analysed, and the result demonstrates that theCHWNAAP meets the requirements of heterogeneous multi-domain wireless networks access security.4) For intra-domain handoff of mobile nodes, this paper designs the intra-domainfast re-anthentication protocol by optimizing CHWNAAP and using the advance trustrelationship. To meet the end-to-end security requirements of heterogeneousmulti-domain wireless networks, this paper designs a cross-domain end-to-endauthentication protocol, providing user identity protection and session confidentiality.This paper designs and implements a cross-domain wireless networks securitysupporting platform based on above technologies. The security supporting platform canbe used to verify the correctness and effectiveness of GHWNM as well as theauthentication protocols.The achievements of this paper can be applied to the next generationheterogeneous wireless networks intergration, and can support mobile internet and IoT.
Keywords/Search Tags:Heterogeneous Wireless Network, Networks Intergration Model, Access Security, Cross-domain Authentication
PDF Full Text Request
Related items