Font Size: a A A

Research On HMIPv6-based Secure Handover Scheme In Wireless Mesh Network

Posted on:2012-12-04Degree:MasterType:Thesis
Country:ChinaCandidate:G WangFull Text:PDF
GTID:2218330371962575Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Mobile IPv6 (MIPv6) is the key technology to implement seamless handover and roaming in next-generation wireless network technology, could provide efficient mobility management mechanism for the wireless mesh network. Hierarchical Mobile IPv6 (HMIPv6) is an extension technology of MIPv6 to reduce the influence to the performance caused by access network handover frequently.HMIPv6-based wireless mesh network could take advantage of the hierarchical mobility management technology to enhance the capability of supporting mobility in the network layer, and realize the seamless handover in wireless mesh network as well as improve the performance. However, from the security viewpoint, the application of HMIPv6 technology in the infrastructure-independent wireless mesh network faces serious security challenges. It couldn't meet the security demand for the mobile handover in HMIPv6-based wireless mesh network environments to apply the existing security scheme directly, further more it causes an enormous influence on the handover performance.According to the in-depth analysis of ECC-based self-certified public key cryptosystems (ECCSCPKC) and its security mechanism, this thesis addresses the HMIPv6-based wireless mesh network secure handover framework and proposes the solutions of the key links in the mobile handover. it not only provide security to the handover process of the network layer in wireless mesh network, but also reduce the influence on the handover performance for the given security mechanism. The main contributions in the thesis are as followings:1. An ECCSCPKC-based secure handover framework is proposed, which according to the research and analysis on the security of ECC-based self-certified public key cryptosystems and its associated security mechanism as well as the availability in the wireless mesh network environment. Under the proposed secure handover framework, we describe the necessity of the proposed framework and how to address the security issues existing in handover process under the ECCSCPKC security system in detail.2. An improved SUCV secure address generation scheme is proposed to address existing security issues in the address generation phase of the mobile handover in the HMIPv6-based wireless mesh network. The address contains the signature of the user's identity information, which is verifiable and unforgeable, by which it could address the security issues mentioned above as well as eliminate the performance influence in the process of duplicate address detection by the uniqueness of the address.3. An ECC-based self-certified public key signature scheme (ECCSCPKS-based) secure access authentication scheme is proposed to address the security issues in the access authentication and home registration phase of the mobile handover, which could address the issues of authentication and authorization, and realizes the mutual authentication between the user and the new access domain as well as the sync completion of the access authentication and home registration.4. A secure route optimization scheme is proposed. It guarantees the security in the general registration process, realizes the mutual authentication between the registration users, and simplifies the process of standard route optimization scheme to improve the efficiency of the general registration process, thereby provides security and performance optimization for the handover process.Finally, the thesis analyze the feasibility as well as the advantages in terms of performance of the proposed secure access authentication scheme and secure route optimization scheme by the result data through the accomplished wireless mesh network testing system.
Keywords/Search Tags:Wireless Mesh Network, Hierarchical Mobile IPv6, ECC-based Self-certified Public Key Cryptosystems, Secure Handover, Access Authentication
PDF Full Text Request
Related items