Font Size: a A A

Research On Several Issues Of Complex Networks And Information Security

Posted on:2018-04-22Degree:MasterType:Thesis
Country:ChinaCandidate:Y H JiaoFull Text:PDF
GTID:2350330515983677Subject:Mathematics
Abstract/Summary:PDF Full Text Request
As the information times develops continuously,users' demands on the quality of communication services also keep increasing.The cooperative communication technology can provide effective diversity gains,and such technology is also regarded as one of the major technologies to be developed for future communication.Therefore,studies on the evolution law and characteristics of the cooperative communication system enable us to better predict and control the changing trend of the system.Meanwhile,during the process of information transmission,the safety of information transmission becomes very important.Because of the rapid development of the internet technology,when information is transmitted on information channels,it may get various attacks such as information eavesdropping,information interception,information counterfeit and information alteration.Our requirements for information transmission go up from only information communication at the very beginning to asking for guarantee of the confidentiality,integrity,and non-repudiation of information communication.So it requires us to take some technical measures to guarantee the safety of the information system,and the password authentication technology is one of the effective measures.In this paper,the author mainly studies the characteristic analysis of cooperative communication based on a BA model in the complex network and trusted authentication analysis regarding information safety.Work the author does is as follows:Firstly,the author gives the research background of this paper as well as the domestic and overseas research status.Then,the author makes mathematical modeling for the cooperative communication system based on a BA model,analyzes the degree distribution of the system model,and then conducts numerical modeling for analysis results.According to the degree distribution diagram,it is obvious that when the degree of a new mode in the system increases gradually,the average degree of nodes in the system also increases.Finally,the author attacks the system in the form of random attacks and target attacks,and conducts numerical modeling for the degree distribution under the attack to prove that compared to random attacks,target attacks have severer robustness influence on the system model.Finally,the author sorts out major authentication technologies and authentication systems currently used,analyzes and compares the authentication technologies applied to various intelligent cards,and then the author points out that existing authentication systems are insufficient and defective,and also makes an overview of the newly developed CFL authentication system.With reference to the relation diagram of trusted computing and information safety in the introduction,the author gives the definition of trusted authentication,i.e.if in all application,all the computing of the authentication system is trusted computing,then such authentication system is trusted authentication.Similarly,when the certificate generation center of CFL and CFL users both base on independent hardware for calculation,CFL authentication system can achieve trusted authentication.
Keywords/Search Tags:cooperative communication, complex networks, BA model, authentication system, CFL(Chen,Fan,and Lü), trust authentication
PDF Full Text Request
Related items