Font Size: a A A

The Research On User Authentication In Complex Network

Posted on:2018-03-15Degree:MasterType:Thesis
Country:ChinaCandidate:F M YanFull Text:PDF
GTID:2428330575497326Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the constant changing of network technology in the information age,the role of network construction in informatization construction is more significant.As network providing people for convenience in life,the ensuing network attacks,phishing sites and other network security factors make the network environment more complex.For the network users of information leakage risk and property loss,the traditional static "user account+password" mode based authentication method has been difficult to satisfy actual needs,because it is easy to be to peek,monitoring,dictionary attack,replay attack and Trojan attacks and other ways to steal.Besides,identity authentication in network has more of the increasingly high demand.In this paper,on the basis of discussing the working principle and current situation of identity authentication technology in detail,the technical details and work flow of digital certificate are discussed emphatically.At the same time,analysis of the RADIUS protocol network access and authentication process,presents a digital certificate based encryption and authentication,so as to further improve the security of user information when user gets authentication in network.In addition,the storage mode and storage structure of user authentication information on RADIUS server are analyzed,and the existing storage methods are visualized.
Keywords/Search Tags:Identity authentication, digital certificate, RADIUS protocol, visualization
PDF Full Text Request
Related items