Font Size: a A A

The Research Of Access Authentication In High-speed Environment

Posted on:2016-04-16Degree:MasterType:Thesis
Country:ChinaCandidate:S T RenFull Text:PDF
GTID:2308330479476630Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The certification is a kind of basic technology to ensure the security of information. Clustering and fast handover is existed in the environment of high-speed Rail and subway because of the intensive of the members in the train and the rapid of the train. The existing wireless access schemes are not well suitable for the high-speed wireless environment as high-speed Rail or subway since the schemes do not take into account the problem of clustering and fast handover. The existing schemes have the problem which terminal cannot smooth handover between access points. So the study on a safe and fast access authentication scheme in the high-speed environment is necessary. This thesis has conducted the research from two aspects, fast authentication and clustering authentication. The realization of fast authentication in the high-speed clustering handover can reduce the overall handover delay. This thesis also studied on the anonymous authentication in order to ensure the privacy and security of user’s identity and location information.This thesis separates authentication and handover in order to solve the problem of fast handover. Completing authentication and interactive information with the next access point(NAP) through the current access point(AP) before access the NAP. Finishing the fast authentication according to the interactive information at the time of handover. Reducing the time of authentication and improving the quality of handover by fast authentication. Fast authentication uses the session key. This thesis calculate the session key by both sides’ product of random number and the public key based on the problem of elliptic curve discrete logarithm, realizing the bidirectional control for the session key and the forward security of information.This thesis introduces the idea of batch authentication in order to solve the problem of clustering authentication in fast handover. Reducing the computing load of the AP through the batch processing of the terminals’ authentication information. However, batch certification will increase the overall delay of handover and the timeliness is poor. So this thesis introduces the idea of separating authentication and handover based on batch certification. The NAP completes authentication and information exchanging with terminal by the aid of the current AP through batch certification before handover. The NAP completes fast authentication with terminal using the interactive information at the time of the handover, reducing the authentication delay through fast authentication and ensuring the quality of handover. The timeliness of authentication information is poor in the process of batch certification. This thesis improves the timeliness of authentication’s information by dividing batch authentication information into groups. Finally solving the problem of clustering authentication in high-speed handover through grouping batch authentication.The anonymous identity can protect the user’s identity and location information. The user’s real identity may be divulged through tracking the fixed anonymous identity. An application for many anonymous will bring the storage burden to the server and terminal. In this thesis, the terminal obtains anonymous identity used in the next time in the time of initial access or update access, but not increase the storage burden of server and terminal, keeping the information of identity and position secret.This thesis presents a linear fast access authentication scheme according to the characteristics of high-speed environment based on the analysis on existing fast access authentication scheme. Having solved the problem of access and handover in the high-speed wireless environment through fast authentication. And this thesis proposes an Anonymous batch fast handover scheme in high-speed environment in order to reducing the load of access point in the progress of clustering authentication. At the same time this thesis realizes the protection of user’s identity by successive obtaining anonymous identity from server.
Keywords/Search Tags:Fast handover, Fast authentication, Clustering authentication, Anonymous, Batch
PDF Full Text Request
Related items