Font Size: a A A

Design And Implementation Of A Mechanism To Resist Content Poisoning Attack In The Identifier Mobile Private Network

Posted on:2019-02-24Degree:MasterType:Thesis
Country:ChinaCandidate:Y J ZuoFull Text:PDF
GTID:2348330542474979Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the rapid development of social economy,the Internet has become an indispensable tool for people to work and study.However,the traditional Internet also brought many problems due to the defects of its original design.In order to solve the fundamentally problem of the traditional Internet,the National Engineering Laboratory for Next Generation Internet Interconnection Devices proposed a new network architecture called Smart,Cooperative Identifier Network.The research in this paper is based on the Identifier Mobile Private Network fusion of the Smart,Cooperative Identifier Network and the Fourth Generation Mobile Communication Network.Combining with the network structure features of Identifier Mobile Private Network,design and implement a mechanism to resist the content poisoning attack and the mechanism can detect fake content timely and can reduce the computing load of the terminal.This mechanism also can reduce the probability of receiving fake service content by mobile terminals and improving the accuracy of access to resources by mobile terminal users.This research in this paper will add a kind of mechanism to resist the content poisoning to Identifier Mobile Private Network,which fusion the Smart,Cooperative Identifier Network and the Fourth Generation Mobile Communication Network.This passage makes a brief introduction to the Smart,Cooperative Identifier Network and the Fourth Generation Mobile Communication System.Meanwhile,also make a brief introduction of research status at home and abroad about content poisoning and mainly solution.Then,this passage make the demand analysis for adding mechanism of defending poisoned content to the Identifier Mobile Private Network and scheme design for adding mechanism of defending poisoned content.In the process of implementation of the scheme,first,it is divided into functional modules according to the function and the process and method of the design and implementation of various functional modules are introduced.In this article,the main contents of the design and implementation are as follow:Design and implementation of SID Credit Grade Management Table on the PGW and complete the function of visiting the SID Credit Grade Management Table and using SID Credit Grade Management Table to manage fake content.Design and implementation of maintenance function for SID Credit Grade Management Table and complete the function of automatic update and feedback update and using the two kind of update to prevent unrestricted growth of SID Credit Grade Management Table.Design and implementation of content signature and feedback forward and complete the function of signature authentication and feedback or forward for content data packet by check probability on eNodeB.Last but not least,by building a test environment,we test the function and performance of the mechanism to defend the content poisoning attack.The test results verify the basic functions of each module.Also,we observe the performance of the network,when it suffers content poisoning attack in varying degrees.The result says,this mechanism can effectively reduce the probability of user receiving fake content data packet.Meanwhile,it reduces the computing load on the mobile terminal.At the end of the article,the full text is summarized,which lays a foundation for the follow-up work.
Keywords/Search Tags:The Fourth Generation Mobile Communication System, the Smart, Cooperative Identifier Network, Content Poisoning Attack, the SID Credit Grade Management Table
PDF Full Text Request
Related items