Font Size: a A A

Research On Secure Network Model And Protocol Based On Access Control

Posted on:2010-07-27Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhangFull Text:PDF
GTID:2178360278480729Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the progressing of science and technology, the application of the internet becomes more and more popular. And at the same time, some defects that designed at the beginning of the traditional internet appear gradually and these defects root in the initial internet architecture. To develope a kind of new network architecture that fits the users'ever increasing mutipule demands on network and application, has become the most important and most pressing research content of the network.Based on the deep analysis of the defects of traditional internet, this paper designs a kind of secure network model which is based on access control and overcomes some defects of the present network.The main work of this paper includes:1. With deep analysis of the architecture and core design theory of the current internet, this paper points out the design defects which are inconsistent with the current network development.2. Against the design defects of traditional internet, this paper proposes a kind of secure network model based on access control. This model based on the separated host identifier and address, proposes a concept of endpoint ID and routing ID, and solves the problems of IP address semantics overload. Endpoint identifier contains the identity information of the user, the user only can use his own endpoint identifier so the credibility controllability and manageability of the network is increased accordingly. This model with the access authentication mechanism built in, creats a creditable communication environment, and with packet control mechanism built in, restricts the endpoint communication.3. This paper designs the access authentication protocol. After analysis and validation, it is proved that this protocol could reach the purpose of security authentication, and possesses some ability against DoS attack.4. This paper has designed and implemented the prototype system based on IPv4 which simulates the idea of separating the host identifier with address and packet control mechanism. After the experimental test, the expected goal is reached.
Keywords/Search Tags:Secure Network Model, Endpoint ID, Routing ID, Access Authentication, Packet Control
PDF Full Text Request
Related items