Font Size: a A A

Research On The Key Technologies Of Multi-level Security Networks And Rfid Anthentication

Posted on:2013-08-11Degree:MasterType:Thesis
Country:ChinaCandidate:Y J LiuFull Text:PDF
GTID:2248330395456298Subject:Information security
Abstract/Summary:PDF Full Text Request
In the future mobile and ubiquitous network environment, both the structure of thenetwork, and access entity has emerged as a heterogeneous, diverse characteristics,which makes it difficult to give a unified approach to solve the secure authenticationproblem. In view of this, authentication technology in the IPv6-based multi-levelsecurity network and in the RFID systems are studied in depth.Firstly, mobile IPv6-based multi-level security network is a private network whichis applied to the high sensitive business, government agencies and military fields. Itallows users with different sensitive levels access to the network, and has the ability ofstoring, transmitting and processing information with different sensitive levels, whilemaintaining multi-level security. As mobile network gradually penetrated into allspheres of society, the problem, how to protect the Multi-level security of mobile IPv6networks in the distributed environment, is a subject worthy of study.In this paper, the authentication technology in security architecture of multi-levelsecurity mobile IPv6network is studied. Some one-way key exchange scheme arepresented, and their implementation for the mobile entity in three scenarios which areregistration, transmission and mobile switching are discussed respectively. In theseimplementations, through the mandatory access control of the access gateway, theauthentication and one-way key negotiation among the mobile node, correspondingnode, the home agent and the local agent is able to be realized. It can avoid thedisclosure of confidential information in bi-directional communication of differentsecurity-level entity, and ensure the multi-level security of the network.Secondly, Radio-frequency identification (RFID) is the use of a wirelessnon-contact system that uses radio-frequency electromagnetic fields to transfer datafrom a tag attached to an object, for the purposes of antomatic identification and thereal-time information sharing. After the concept of “Internet of Things” was presented,the range and depth of the application of RFID technology are obtained fast expansion.However, the RFID tag has limited resource and computing power, which have broughtquite difficult for the development of RFID technology and the design of anthenticationscheme, especially that the existing mature public-key cryptography is very difficult tobe directly applied in the RFID anthentication.Therefore, in this paper, we study and improve a commission-computing basedRFID authentication protocol, and proposed a update mechanism about the pre-calculation factor, which let the security of the RFID anthentication system bestronged with small cost. And, we achieve the key stream generator and the pseudorandom number generator in the scheme based the algorithm of Grain v1. Analysisshows that the proposed scheme has high security and feasibility.
Keywords/Search Tags:Multi-level security, Mobile IPv6networks, One-way key exchangeRFID authentication, Key stream generator
PDF Full Text Request
Related items