Font Size: a A A

Software Design Of Extensible Security Gateway Protocol Based On NIO

Posted on:2016-04-07Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y ZhangFull Text:PDF
GTID:2308330470955745Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
Promoting the wisdom of urban construction and application is an important way to the new era of urban development transformation. Information about the wisdom of the city in recent years, security system, improving information security infrastructure, strengthen security and other important information systems continue to make achievements. Enterprises play an important role in advancing the process of smart city, so the enterprise network security is more and more concerned. The Gateway is an important guarantee of network security. It is a network connection to another network gateway, so the security gateway design becomes very important.Research content of external service network and internal service network for data exchange are required by Web proxy gateway, and access control can take place. For other non-HTTP protocol does not support the existing business who wish to exchange information within and outside the network, have to try to convert the application into HTTP, Application services require extensive renovation, there are some applications can not be modified (such as SAP protocol applications).They can not exchange information. How to solve the existing problem is imminent.Firstly, according to business needs to customize the protocol, design Contrast IP authentication and IP/PORT authentication, summarize their advantages and disadvantages. Encryption uses a cryptographic key encryption and certificate are two ways for users to choose.There are two sides agreed well in advance key of encryption key, and then use the MD5encryption. The certificate encryption certificate is previously imported, then mixed using RSA and AES encryption. Agreement Protobuf using Google’s data package to increase the data transmission efficiency and ensure the case of high concurrency while more consideration to the stability.
Keywords/Search Tags:Network security, The gateway, Data encryption, The extended protocol
PDF Full Text Request
Related items