Font Size: a A A

Research And Optimization Of Access Authentication Protocol Based On BAN Logic

Posted on:2018-11-14Degree:MasterType:Thesis
Country:ChinaCandidate:W W ZhongFull Text:PDF
GTID:2348330518996891Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of communication technology, mobile internet presents an explosive development. In order to meet the requirements of users' increasing communication rate, the network architecture has been flattened. However, due to various reasons such as cost, the upgrading speed of physical equipment is obviously lagging behind the development of technology. Therefore, different kinds of mobile network will coexist for a long time in a certain period of time. The importance of interoperability among different networks will emerge. The rate of handover is one of the important issues that need to be solved to meet the user rate requirements.In addition, with the development of software technology,video-related software is becoming more and more welcome, making mobile data traffic growth, which not only brings pressure to the mobile network traffic, but also generates a high traffic costs. At the same time,the emergence of products based on wireless network technology solve the traffic and rate problems effectively, which not only greatly promoted the development of wireless local area network (WLAN), but also let the wireless access security issues bring industry's attention.EAP protocol is one of the important protocols to ensure communication security during communication, which is a general designation of a group of protocols. When a device with card performs network access or inter-network handover, authentication and key negotiation are performed between the user device and the network server through the EAP-AKA protocol to ensure the security of network access and inter-network handover. When a device without card performs Wi-Fi access, the security tunnel is established through the EAP-TTLS protocol,and then the message is exchanged through the tunnel in the form of AVPs to ensure the security of the authentication process.Firstly, this paper introduces the development background of LTE network and WLAN, the background and significance of this research,the research status of different authentication protocols at home and abroad. It analyzes the improvement direction of the existing protocols,and describes the development of network architecture and security architecture in mobile Internet development in detail. Then, this paper describes the authentication process of EAP-AKA protocol in detail. By analyzing the process of access authentication and re-authentication of devices with USIM card, this paper proposes a corresponding solution according to the problem of low re-authentication rate in existing inter-network handover analyzed before. At the same time, this paper describes the authentication process of EAP-TTLS protocol in detail. By analyzing the safety problem that uses username and password to access Wi-Fi existing in the protocol, this paper proposes the corresponding solutions to solve existing safety problem. At last, the paper analyses the security of the improved protocol by BAN logic, and analyses the efficiency of the improved protocol.
Keywords/Search Tags:EAP-AKA, EAP-TTLS, BAN logic, re-authentication, wireless local area network
PDF Full Text Request
Related items