Font Size: a A A

Research And Application Of Access Authentication Technology Based On PKI And Identity-based Cryptography For HMIPv6 Network

Posted on:2016-05-05Degree:MasterType:Thesis
Country:ChinaCandidate:B Z SuoFull Text:PDF
GTID:2428330542989621Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of broadband wireless access technology and mobile terminal technology,the increasing number of mobile devices and access network needs,mobile IPv6(MIPv6)will be an important support for the next generation of mobile communications protocol.To further enhance the applicability and efficiency of the mobile node MIPv6 handover in a foreign network,IETF develop a hierarchical Mobile IPv6(HMIPv6).HMIPv6 protocol introduced mobile anchor point for the mobile node implementation of regional mobility management,handover occurs when the mobile node,MN is not with the remote home agent,but with the local MAP binding updates,reducing the switching delay,but lack of safety considerations.Open mobile Internet increases the potential security threat,when the mobile node access a foreign network,you need to authenticate the identity of the foreign network with each other,which is the basic requirement for secure communications.In addition,switching and authentication of the mobile node often occur simultaneously,for the protection of real-time applications,authentication mechanism should be synchronized with the handover process,as far as possible to ensure that the switching efficiency.In this paper,the standard model has enough nodes security certificate mechanism proposed multi-level short signature scheme,designed for multi-MAP in HMIPv6 network under the mutual authentication protocol,which not only shortens the length of the hierarchical signature improve hierarchical identity signature efficiency signature scheme in standard model and combined certificate mechanism to ensure a more mobile network access authentication security,compared with the traditional identity-based authentication scheme,a higher level of security,and the program for multi-level HMIPv6 network expansion agreement,more fit to practice,with better general applicability.Finally,the signature scheme design and implementation of the proposed access authentication scheme simulation and analysis,proved the proposed access authentication scheme has higher efficiency certification,and improve the security of the authentication,to effectively address the wireless environment access security issues.After analysis shows that the program reduces the number of interactions between the nodes,and the realization of local authentication,when a mobile user is away from the home network can greatly reduce certification time.
Keywords/Search Tags:hierarchical mobile IPv6, identity-based cryptography, multilayer MAP, hierarchical short signature, access authentication
PDF Full Text Request
Related items