Font Size: a A A

Based On The Research Of Remote Communication Network Security Protocol

Posted on:2014-01-28Degree:MasterType:Thesis
Country:ChinaCandidate:J ZhangFull Text:PDF
GTID:2248330395491692Subject:Traffic Information Engineering & Control
Abstract/Summary:PDF Full Text Request
Engineering vehicle remote communication is an important part in theengineering vehicle remote fault diagnosis system. And plays a connecting rolein the whole engineering vehicle remote fault diagnosis system. In recent years,the researchers put forward many improved measures.Such as how to improvedata transmission rate and transmission efficiency and so on. But how to protectthe data and information transfer accurately and safely, in particular, protectfrom external attacking by malicious attacks, that is, how to protect theaccuracy of the data has been somewhat neglected by researchers. In the securityof network communication area, the most effective and direct solution is thesecurity protocol.Security protocol can solve a series of important securityissues effectively. Such as the against denial of service, message integrity,authorization, anonymous communication, authentication, anti-denial, goalcertification and origin authentication. Therefore, the main object of study in thispaper is the network security protocols which is in the the background ofengineering vehicle remote communication system.This paper analyzes the security threats of network securityprotocols,compares and analysises two methods of analysing securityprotocols——formal analysis methods and non-formal analysis methods.Identifies analysising the network security protocol in a non-formal analysismethod Puts forward a new classification method——basic theory securityprotocols and application security protocols on the common classificationmethods. Study the representative protocols in these two kinds of protocol inengineering vehicle remote communication system——Woo-Lam protocol andGPRS authentication protocol.This paper studies the Woo-Lam protocol, which has a trusted third partyserver.Points out it has the fresh loopholes in the signature of a trusted thirdparty server, and finds a new mode of attack to this loopholes. Puts forword theimprovement which is add a timestamp to the signature of a trusted third-partyservers, improves the security of the protocol. For GPRS authentication protocol, through the analysis of the existingauthentication protocol, this paper finds the weak point which are poor security,high load of the authentication gateway and long certification time. Improvesthis protocol by adding a synchronous counter and changing the authenticationgateway to this agreement. Improves the security of the entire authenticationprotocol process. Reduces the load of authentication gateway and certificationtime.
Keywords/Search Tags:Engineering vehicle, Remote communication, Network securityprotocols, Woo-Lam protocol, GPRS authentication protocol
PDF Full Text Request
Related items