Font Size: a A A

Design And Implementation Of Authentic Identity Commnunication System, Based On Source Information Semantics

Posted on:2016-06-15Degree:MasterType:Thesis
Country:ChinaCandidate:D Q ZhouFull Text:PDF
GTID:2308330503456367Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Tradiontional network is lack of a broad credible basis, which results lots of security problems, such as forged websites. These forged attack brings our society huge losses.It is even more serious that we don’t have a convient system to locate and confirm the attacker after the attack, so we are unable to stop and punish the attacker quickly.To solve this problem, firstly, this thesis purposes a model ”Source Information Semantic Definition Model”. The model indicates that the network can support more and more future network function by making full use of source information and its semantic definition. Based on this model, this thesis designs the credible basis for the Internet.Secondly, this thesis chooses source IPv6 address as the carrier of user’s identity, designs and implements the Authentic Identity Commnunication System. Based on source address validation, this system can filter forged packets and replayed packets e?ectively,which secures the Internet and makes user identity as the credible basis of the Internet.What’s more, the system also provides a quick and cross-domain verification way to locate and confirm the identity of network users. As soon as detecting network attack, the system can help find out the identity of the attacker so that the attacker can be stopped and punished. And the system meets the requirements of three design principles of network security system: privacy, verifiability and authenticity. Thirdly, in the implementation of the system, the interface of the encryption algorithm is open to third party developpers for transplantation and upgrade. Meanwhile, this thesis purpose three requirements for the encryption algorithm: security, authenticity and reduction. This thesis designs and implements the authentic indentity generating algorithm, which meets all the three requirements.In the end, this thesis conducts a comprehensive test on the performance and security of the system, which proves the feasibility and security of the system.
Keywords/Search Tags:Source Address Validation, Network Security, Address Assignment, Identity Authentication
PDF Full Text Request
Related items