Font Size: a A A

The Research Of Security Technology In The Heterogeneous Network Integrated Of3G, WLAN And Wireless Mesh Network

Posted on:2013-01-09Degree:MasterType:Thesis
Country:ChinaCandidate:L HeFull Text:PDF
GTID:2298330422973870Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
In recent years, with the development of wireless networks, various wirelessnetwork technology come up rapidly. Their respective strengths complement each other,and can not substitute for each other, and in order not only to retain the original networkresources, but also to take full advantage of the advantage of the kinds of networks,network convergence is inevitable trend of development.Heterogeneous converged networks, however, combines both the advantages ofeach network, but also the inevitable shortcomings of the various networks intoconverged networks. Each network uses different authentication method, does keymanagement in different ways, and the security situation is also different. There arecomplex and diverse kinds of security problems, so the security issues of heterogeneousintegrated network become more acute and complex, which is the problem we mustfocus on solving in the network convergence process, but also become a focus forresearchers.The research of security technology in the heterogeneous network integrated of3G,WLAN and wireless Mesh network has important practical significance and significantresearch value. First, this paper introduces the research background and significance ofheterogeneous converged networks, and then summary the wireless heterogeneousnetwork security research status, which involves the status of the wireless networkconvergence and the status of3G networks, WLAN and wireless Mesh network security.Second, wu designed a network architecture of heterogeneous network integration of3G,WLAN and wireless Mesh. In the architecture, all the nodes get managed in accordancewith the cluster structure to form multiple clusters, cluster head shared network privatekey with (t, n) threshold method, which play the role of distributed CA. On the basis ofthis structure, we study the access control technology, design a role-based hybrid accesscontrol mechanisms; then we put forward a unified authentication mechanism, and givea detailed analysis of its security. Next, the paper designs a key agreement protocol, anda description of the management of distributed key which contains the key sharedmethod, key update method, method of distributing certificates, as well as the treatmentof malignant nodes. Finally, we make the security analysis, and the analysis displays agood security effect.
Keywords/Search Tags:3G, WLAN, Wireless Mesh, Heterogeneous Integrated network, Authentication
PDF Full Text Request
Related items