Font Size: a A A

Research On Data Interactive Security Technology Of Distributed Simulation

Posted on:2015-07-10Degree:MasterType:Thesis
Country:ChinaCandidate:Z WangFull Text:PDF
GTID:2348330518470436Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The emergence of HLA/RTI technology provides great impetus for the development of distributed interactive simulation technology. With the expansion of the scale of the simulation, the traditional LAN cannot satisfy the needs of the simulation scale, the simulation gradually expands to the WLAN. It has become a hot issue in the field of modeling and simulation to extend the HLA simulation system architecture in the current. Illegal federal members can easily get messages from HLA, due to the HLA/RTI does not provide data transmission security or access control mechanism. That means the HLA/RTI is unable to ensure the security of data interaction.This thesis analyzes the two data interaction security problems that exist in the HLA and then analyses and compares the previous security solutions. This work finds out that the previous security solutions cannot solve the problem of the published subscription contents access control of the HLA interaction data between the federal members effectively. The paper proposes an identity based proxy data access control technology on this basis, and compared with several kinds of access control model those have been commonly used to prove its feasibility and effectiveness on the content access control. This thesis designs an access control model based on certificate authority, including two major modules: Security Services Module and ICE Security Middleware. Among them,the Security Services Module offers a variety of security services. Various security services provide services in the form of module components in order to be added and removed easily so that it has good scalability.ICE security middleware provides various security services to the client application and has realized the ICE interface at the same time,thus it can get security services from the security service center. Because of the secure communication with RTI by just implementing RTI interface, It only needs to implement its interface to interact with RTI in the development of client application, which greatly simplifies the development steps of simulation application and makes the developer more focus on the development of simulation application logic. In addition, the system has good scalability and maintainability. Its efficiency has greatly improved through experiments especially when the number or attributes of members of the Federal has a grown to a certain size. It can solve the security problem of HLA data interaction effectively.
Keywords/Search Tags:Security of data interaction, Security Middleware, Access Control, HLA, ICE
PDF Full Text Request
Related items