Font Size: a A A

Access Authentication Architecture For Vector Network And Its Application In Accounting

Posted on:2019-04-19Degree:MasterType:Thesis
Country:ChinaCandidate:J YuFull Text:PDF
GTID:2348330542987545Subject:Control Science and Engineering
Abstract/Summary:PDF Full Text Request
Today,network has infiltrated into every aspect of daily life.IP network has been mature and widely used.However,the IP network runs into a stone wall of security and providing QoS services because of its characteristics of connectionless and shortest-path-routing.Compared with the IP network,Vector Network is a new type of light-connected network that guarantees QoS,unlimited expansion and other advantages.Vector Network requires strict access authentication,while the existing IP network access authentication mode is relatively simple,which can not be satisfied for Vector Network.Therefore,this thesis proposes a Vector Network access authentication architecture,using different authentication schemes in different stages and undertaking different responsibilities.The main work as follows:(1)The design of vector network driver authentication is based on the improvement of 802.1x protocol,which realizes mutual authentication and key agreement.Finally,we build a network topology in omnet++ to achieve the process of driving certification and capture packets to analyze authentication information.(2)Device authentication adopts OpenLDAP(Lightweight Directory Access Protocol),and the LDAP server configuration and client login authentication been implemented in linux system.(3)The design of user authentication uses identity-based signature scheme.This thesis designs a secure algorithm to achieve the user's privacy protection,then implements it with JAVA.(4)Finally,an improved network charging reporting scheme is proposed based on the application of authentication,which saves network bandwidth,and the authentication result can be nonrepudiation and retrospective liability.In the Vector Network,authentication objects can maintain connection by muti-path which is reliable,simple and low cost.The signaling data for authentication is much less than all communication data which makes it difficult for the attacker to capture user's information.Additionally,because of the particularity of vector address,if a hacker intercept vector packet of authentication information,there is no way of knowing the sources of information,so as to improve the safety of network further.
Keywords/Search Tags:vector network, access authentication, 802.lx, identity-based authentication, OpenLDAP
PDF Full Text Request
Related items