Font Size: a A A

Design And Implementation Of Trusted Network Control Technology Simulation Platform

Posted on:2018-07-31Degree:MasterType:Thesis
Country:ChinaCandidate:Q ZhouFull Text:PDF
GTID:2348330512988004Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
With the development of Internet in the network scale and application field,the economy and the life style of human have changed greatly.But a great deal of network security problems have arisen,such as non-controllability of user behavior,IP address double semantic,lack of safety certification for user accessing,non-traceability of attackers,etc..Network security problems have emerged one after another,the network reliability has become the basic requirements for users,and in the aspect of network system,trusted network protect the network security and reliability,by establishing a unified network credible regulatory system.With the condition that theories are ample before the thesis is written,the technical framework of network trusted is designed and simulation results are analyzed based on different performance to verify the security and network performance of the trusted network.Firstly,the framework of trusted network control system is introduced in the thesis.Then,with trusted access,reliable transmission and routing as the main line,a deeper research of the trusted network is studied based on the identifier/locator separation and trust management model.Secondly,OPNET Modeler is utilized as a simulation tool to design and implement several network model,and a comprehensive way of network interaction and communication is built by this tool.Then,the communication event flow of the simulation platform and the packet format and type of the custom protocol is introduced.Also,a detailed description about internal information and protocol exchange process is needed combined with the theory of the trusted network.Finally,the common network attacks are listed.By designing the typical test cases and analyzing the simulation results,the validity and feasibility of the trusted network are proved.
Keywords/Search Tags:trusted networks, identifier/locator separation, trust model, trusted control
PDF Full Text Request
Related items