Font Size: a A A

Research On The Roaming Authentication Protocol Of The Mobile Network In The Formalization Way

Posted on:2013-11-04Degree:MasterType:Thesis
Country:ChinaCandidate:Y Q WengFull Text:PDF
GTID:2248330371498560Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
The Implementation of roaming in mobile network environments can not onlybring a lot of convenience for those users who need to move between different areasdue to work or live, but also provide good benefits for service providers.To allowsusers to enjoy network services anytime and anywhere,and to ensure the security oftheir personal information, there must be a certain amount of secure roamingagreements as technical supports.A large number of research scholars have proposedsome of roaming programs in the joint efforts,but there are more or less someshortcomings in terms of security.This text begins with the background to the studyof authentication protocol, summarizes the problems of traditional authenticationprotocol such as no anonymity and no flexiblity.According to the actual demand, thispaper argues on the significance of mobile network roaming,and compared theadvantages and disadvantages between Certificate-based and Identity-basedauthentication study, by analyzing and generalizing the results of previousstudies.After the Analysis on the several commonly used protocol such as mobile IPprotocol,IEEE802.11, IAPP, and identity-based anonymous roaming wirelessauthentication protocol,this paper synthesizes its advantages and disadvantages,andproposes a new mobile network roaming authentication protocol SRAK,whichgathers together the features of certificate Certificate-based and Identity-basedauthentication.In addition, this paper has a research on the formal methods forsecurity protocol analysis and design, and makes focus on the BAN logic symboltheoretical method,which was used to inprove Aziz-Diffie protocol. It made Kailarlogic Extended and the SVO logic applied, and combined with certification testingtheory and relevance theory, it also carried out some research on the formal analysisof the string space method,which is applied to the analysis of OR, found that existsvulnerability,improving it.This article analyzes the new agreement SRAK by meansof Kailar logic theory,and prove that the protocol is safe and reliable.
Keywords/Search Tags:roaming agreements, Formal Analysis, the BAN logic, Kailar logic, the String Space
PDF Full Text Request
Related items