Security for Heterogeneous Wireless Networks ——Based on Vertical Handover between WLAN and 3G TECHNOLOGIES

Security for Heterogeneous Wireless Networks ——Based on Vertical Handover between WLAN and 3G TECHNOLOGIES

论文摘要

许多无线技术,如今已规范化并且得到了很好的推广。同时,每个技术都有其不同的覆盖范围和带宽的限制。因此,为了便于资源共享,整合这些无线技术,使它们协同工作是很有必要的。由此可见,为了达到无所不在的高性能的无线通信,异构无线网络的互联,互通变得尤为重要。众所周知,每个技术都具有自己独立的安全架构,为了使得这些安全架构在网络融合的时候可以各适其责,各种安全技术之间的融合的架构问题,成为现在科技的一个很大的挑战。在这篇文章中,我们将讨论如何才能使得漫游的用户能够实现安全认证的问题,从某一个类型的无线通信协议,到另一种类型的无线通信协议,使得它们之间能够很好地融合。特别是当你必须从一个网络移动到另外一个网络,为了使得用户在继续保持通信,网络的融合变得尤为重要。切换出现在一个用户从一个服务覆盖地区切换到另外一个服务覆盖地区的时候,此时,必须建立新的连接,在新的连接建立完成之后,老的连接就必须要终止。在切换时,如果遇到服务区繁忙,可以把该用户切换到服务不是很繁忙的服务区或者接入点。本文的工作如下:本文讨论的传统方法在漫游的情况下,用来重新授权用户时的问题,以及多个独立节点的预先授权问题(MPA),阴影注册,最优化接入等问题。AN与面临的具有挑战性的问题。我们在工作中我们在接入一个网络时,需要先执行预先配置和预先验证到目标网络。在阴影注册法中,MN和每一个附近的AAA认证服务器连接时,就会有一种安全协助机制保证接入安全。当一个MN移入该区域时,注册已经完成,AAA认证机制只用在当地完成,而不需要到MN的当地完成。而另一传统方法是最佳优化的接入方法,在次方法中,只有在切换完成之后才能进行认证,但是它减小切换时延,但是由于缺乏强有力的验证过程,是比较容易被攻击的网络,所以此网络更适合信用杜高的人使用.在推荐的方法中,令牌环是用来完成一的EAP-令牌的验证方法,使用的EAP -令牌,将有利于未来的认证快的异构无线网络,特别对于常跨国界的旅游者来说,是更有优势的.用户可以首先连接到一个外国的主要运营商,该运营商与本国的运营网络可以互联,他确立一个路径,并且与其它的无线网络建立连接。在一个国家内,大多数的无线运营商都有一套完整的漫游协议

论文目录

  • Abstract
  • Abstract (Chinese)
  • Dedication
  • Acknowledgements
  • List of figures
  • List of Tables
  • Acronyms
  • CHAPTER ONE: INTRODUCTION
  • 1.1 Introduction of the thesis
  • 1.2 Objectives and scope of the thesis
  • 1.3 Importance of the study
  • 1.4 Background of the problem
  • 1.5 Thesis organization
  • CHAPTER TWO Background of WLAN and its Security Concepts
  • 2.1 Overview of Wireless LAN
  • 2.1.1 Brief history of WLAN
  • 2.1.2 Wireless LAN components
  • 2.1.3 Wireless LAN requirements
  • 2.1.4 Wireless LAN applications
  • 2.1.5 Wireless LAN technology
  • 2.1.6 Benefits of wireless LAN
  • 2.2 IEEE 802.11 wireless LAN standard
  • 2.3 IEEE 802.11 WLAN architecture
  • 2.4 IEEE 802.11 Medium Access Control
  • 2.4.1 Reliable Data Delivery
  • 2.4.2 Shared Access Control
  • 2.4.3 Security Considerations
  • 2.5 IEEE Physical Layer
  • CHAPTER THREE Background of 3G and its Security Concepts
  • 3.1 Over view of 3G
  • 3.1.1 Introduction of UMTS
  • 3.1.2 The main differences between UMTS and GSM
  • 3.1.3 UMTS Services
  • 3.2 UMTS architecture
  • 3.2.1 Core network
  • 3.2.1.1 Circuit switched domains
  • 3.2.1.1.1 Mobile services Switching Centre (MSC)
  • 3.2.1.1.2 Visitor location register (VLR)
  • 3.2.1.1.3 Gateway MSC (GMSC)
  • 3.2.1.2 Packet switched domains
  • 3.2.1.2.1 Serving GPRS Support Node (SGSN)
  • 3.2.1.2.2 Gateway GPRS Support Node (GGSN)
  • 3.2.1.3 Home Environment
  • 3.2.1.3.1 Home location register (HLR)
  • 3.2.1.3.2 Authentication Centre(AuC)
  • 3.2.1.3.3 Equipment Identity Register. (EIR)
  • 3.3 UMTS Terrestrial Radio Access Network
  • 3.3.1 Radio Network Controller (RNC)
  • 3.3.2 Base Station (NodeB)
  • 3.4 User Equipment
  • 3.4.1 Terminals
  • 3.4.2 Universal Integrated Circuit Card(UICC)
  • 3.4.3 UMTS Subscriber Identity Module (USIM)
  • 3.5 UMTS Security Architecture
  • 3.5.1 Authentication
  • 3.5.2 Confidentiality
  • 3.5.3 Integrity
  • CHAPTER FOUR Some of Protocols Used for Authenticatins
  • 4.1 Authentication Protocols
  • 4.1.1 Point-to-Point Protocol (PPP)
  • 4.1.2 Extensible Authentication Protocol (EAP)
  • 4.1.2.1 EAP Packet Format
  • 4.1.2.2 EAP Protocol Overview
  • 4.1.2.3 EAP Pass-through
  • 4.1.3 EAP-TLS
  • 4.1.4 IEEE 802.1x
  • 4.1.5 Remote Authentication Dial-In User Service (RADIUS)
  • 4.1.5.1 RADIUS Messages
  • 4.2 Roaming and Authentication
  • 4.2.1 Authentication and Key Agreement Protocols
  • 4.2.1.1 Involvement of Home Network
  • 4.2.1.2 Key Derivation
  • 4.2.1.3 Symmetric Key Based
  • 4.2.1.4 Public Key Certificate Based
  • 4.2.2 Inter-Domain Authentication
  • 4.2.3 Handovers and Authentication
  • 4.2.4 Handover Types
  • 4.3 Media-Independent Pre-Authentication
  • 4.4 Shadow Registration
  • 4.5 Optimistic Access
  • CHAPTER FIVE: Heterogeneous Network
  • 5.1 Introduction of heterogeneous network
  • 5.2 Overview of vertical mobility
  • 5.2.1 Background: A short history of Vertical Mobility
  • 5.2.2 Interworking Heterogeneous Networks
  • 5.3 System Architecture and Design Issues
  • 5.3.1 Features of B3G Systems
  • 5.3.2 Technical aspects of vertical mobility
  • 5.3.3 Integration models
  • 5.4 Mobility management in heterogeneous networks
  • 5.4.1 Macro and Microbility
  • 5.4.2 Handoff Strategies
  • 5.4.3 Vertical Handoff Characteristics
  • CHAPTER SIX: Proposed Protocols
  • 6.1 Proof-Token Based Approach
  • 6.1.1 Protocol Operation
  • 6.1.2 Protocol Analysis and Comparison
  • CONCLUSION & FUTURE WORK
  • ACKNOWLEDGEMENTS
  • Reference
  • 相关论文文献

    • [1].Three-dimensional image authentication using binarized images in double random phase integral imaging[J]. Chinese Optics Letters 2019(05)
    • [2].A dynamic PUF anti-aging authentication system based on restrict race code[J]. Science China(Information Sciences) 2016(01)
    • [3].One-to-many authentication for access control in mobile pay-TV systems[J]. Science China(Information Sciences) 2016(05)
    • [4].Research on a provable security RFID authentication protocol based on Hash function[J]. The Journal of China Universities of Posts and Telecommunications 2016(02)
    • [5].An area based physical layer authentication framework to detect spoofing attacks[J]. Science China(Information Sciences) 2020(12)
    • [6].Novel SNP markers on ginsenosides biosynthesis functional gene for authentication of ginseng herbs and commercial products[J]. Chinese Journal of Natural Medicines 2020(10)
    • [7].A framework of hybrid authentication for link access under MIH environments[J]. Journal of Measurement Science and Instrumentation 2012(04)
    • [8].Secure authentication of classical messages with single photons[J]. Chinese Physics B 2009(08)
    • [9].A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes[J]. Science China(Information Sciences) 2020(03)
    • [10].Bilinear pair based authentication protocol for wireless medical sensor network[J]. The Journal of China Universities of Posts and Telecommunications 2018(02)
    • [11].Security Analysis of an Attractive Online Authentication Standard:FIDO UAF Protocol[J]. 中国通信 2016(12)
    • [12].Efficient and secure image authentication with robustness and versatility[J]. Science China(Information Sciences) 2020(12)
    • [13].Handover authentication between different types of eNBs in LTE networks[J]. The Journal of China Universities of Posts and Telecommunications 2013(02)
    • [14].A framework of physical layer technique assisted authentication for vehicular communication networks[J]. Science China(Information Sciences) 2010(10)
    • [15].A MEMS stronglink with multi-try function used for PC startup in authentication system[J]. Journal of Harbin Institute of Technology 2009(02)
    • [16].Research and improvement on the limitation of authentication test[J]. High Technology Letters 2008(03)
    • [17].Anonymous authentication protocol for multi-services in wireless environments[J]. The Journal of China Universities of Posts and Telecommunications 2008(04)
    • [18].Identity-based authentication protocol for grid[J]. Journal of Systems Engineering and Electronics 2008(04)
    • [19].ePUF: A Lightweight Double Identity Verification in IoT[J]. Tsinghua Science and Technology 2020(05)
    • [20].An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks[J]. Journal of Zhejiang University-Science C(Computers & Electronics) 2011(07)
    • [21].Improvement on a Biometric Based User Authentication Scheme in Wireless Sensor Networks Using Smart Cards[J]. Wuhan University Journal of Natural Sciences 2020(02)
    • [22].一种简化的低开销家庭基站重认证协议(英文)[J]. 中国通信 2013(01)
    • [23].AAA authentication for network mobility[J]. The Journal of China Universities of Posts and Telecommunications 2012(02)
    • [24].Abbreviation Index[J]. ZTE Communications 2008(03)
    • [25].Analysis and design of a smart card based authentication protocol[J]. Journal of Zhejiang University-Science C(Computers and Electronics) 2013(12)
    • [26].One-way quantum identity authentication based on public key[J]. Chinese Science Bulletin 2009(12)
    • [27].Construction of authentication codes with distrust arbitration from polynomials over finite fields[J]. The Journal of China Universities of Posts and Telecommunications 2017(01)
    • [28].Secure and Efficient Mutual Authentication Scheme for NFC Mobile Devices[J]. Journal of Electronic Science and Technology 2017(03)
    • [29].A PUF-Based and Cloud-Assisted Lightweight Authentication for Multi-Hop Body Area Network[J]. Tsinghua Science and Technology 2021(01)
    • [30].A Behavioral Authentication Method for Mobile Based on Browsing Behaviors[J]. IEEE/CAA Journal of Automatica Sinica 2020(06)
    Security for Heterogeneous Wireless Networks ——Based on Vertical Handover between WLAN and 3G TECHNOLOGIES
    下载Doc文档

    猜你喜欢