Font Size: a A A

Research And Analysis Based On 3G-WLAN Security Access Scheme

Posted on:2016-04-13Degree:MasterType:Thesis
Country:ChinaCandidate:J F MiaoFull Text:PDF
GTID:2348330542976243Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
WLAN is a high-speed wireless access technology.It has the characteristics of low cost and convenient deployment and so on.But the coverage of WLAN is small.It is limited to thehot spot area and indoor coverage.3G network can support traditional voice business,with perfect authentication and billing mechanism,and support seamless roaming the global scope.Compared with WLAN,3G network provides the low of the data transmission rate,the narrower of network bandwidth and higher cost.3G and WLAN fusion can realize the complementary advantages between them and generate some new security problems.According to the specific problems of access security of 3G-WLAN in fusion research,the main work is as follows:(1)the relevant technology is introduced.This paper introduces the basic concept of W LAN network technology and 802.1x in port based access control technology,and then analyzes the security protocol 802.11 i and WAPI in the aspect of secure access authentication,key negotiation flexibility and access delay.The extensible authentication protocol EAP is introduced,and then introduces the structure of 3G network technology and security authentication in 3G,3G and WLAN network of fusion methods.(2)analysis and improvement of EAP-AKA protocol.the authentication process of the EAP-AKA protocol is detailed description,and this paper analyzes the main threat,puts forward a kind of enhanced scheme throw additional public key for WLAN access network and the use of anonymous technology.It completes the WLAN access network authentication and avoids user identity information of exposure.It encryps session key of transmission,and ensures the safety of a user network service.Then it analyzes its security.(3)the 3G-WLAN network fusion of authentication protocol based on 802.11 i and WAPI.The integration of 802.11 i and WAPI protocol security advantages,this paper proposes a new 3G-WLAN security access scheme for EAP-WPI protocol,and it uses the EAP authentication framework of 802.11 i and the ECDH key agreement algorithm of WAPI,and the use of public key cryptography technology without certificates in the certification process eliminates the deployment of the burden of PKI.At the same time it analyzes its security for the proposed protocol.(4)the simulation test of EAP-WPI protocol.This paper detailies descript of the function and designs of OPNET simulation tool.It designs the specific of the simulation model for the EAP-WPI protocol.Using the simulation tool is used to test the protocol.The analysis results show that the protocol can decrease the access delay,improve the system accessthroughput,and further improve the network performance of the system.
Keywords/Search Tags:3G-WLAN, 802.11i, WAPI, EAP-AKA, security access
PDF Full Text Request
Related items