嵌入式内网身份认证的实现方法研究

VIP免费
3.0 高德中 2024-11-19 5 4 1.72MB 40 页 15积分
侵权投诉
用户的身份认证是其他网络安全措施的基础,是无线网络安全的第一道门槛,
因而身份认证对无线网络安全来讲是至关重要的,如果身份认证出现问题,那么
整个无线网络的其他安全措施就没有任何意义了。无线校园网络飞速发展,无线
网络的应用日益广泛,校园网面临的安全问题也日趋严峻。所以如何确定用户的
身份从而控制用户对信息资源的访问,保证无线网络访问者的合法性,是一个值
得深入研究讨论的问题,是目前无线网络安全的重要研究方向。
本论文首先对保障无线校园网网络安全所涉及的问题,如:密码学知识、身
份认证技术和认证协议进行了理论探讨,阐述了各种身份认证技术的基本原理和
实现方法,然后对局域网网络中常用的身份认证技术和认证方案进行了对比分析,
找出了他们的优缺点。论文分析了目前流行的动态口令认证协议存在的缺陷,如
Tsaur 等人的身份认证方案,进而提出了一种基于挑战/应答认证机制的动态口令
认证的改进方案即嵌入式内网身份认证。本方案使用时间因子作为随机数生成挑
战数,利用单向 hash 函数生成消息摘要,使用公钥密码 ELGamal 算法对传递的信
息进行加解密。本系统将作为软件部件安装在安全网关上,配合网关的其他安全
功能保护无线校园网的安全。该系统实现了通信双方的相互认证功能,并且能够
防止攻击者非法访问,能抵御信息截获,重放攻击,能抵抗离线字典攻击等主动
和被动攻击手段。
论文详细分析了该系统的各种性能,并与其他方案做了对比,经过系统功能
测试和性能测试可以看出,本文提出的身份认证模型与其他身份认证模型相比,
安全性能有所提升,而且认证速度较快在用户可接受的范围之内,时,服务器
使用线技术使得认证效率,有很大的应用前
键词:动态口令 身份认证 公钥加密机制 hash 函数 挑战/应答
Abstract
Identity authentication is used to identify the identity of communicators, which is
the basis of the wireless network, so it is an important research field. As the
development of the wireless network in campus, more and more activities rely on the
wireless network, and the problem of identity authentication in the wireless campus
network is more and more important. So it is a researchable thing to confirm the user’s
identity and control the access of information resource, and it is an important research
field.
First, it introduces the theory related in campus wireless network, such as
technology of cryptograph research, identity authentication and identity protocol, and
expounds the principle and method of identity authentication in this paper. Then it
compares the common authentication in the intranet, and summarizes the advantages
and disadvantages. It analyzes the mainstream identity authentication such as Tsaurs
authentication, then proposes an embedded intranet authentication, which is based on
challenge/response mechanism. This scheme is part of the embedded security gateway,
which can improve the security of wireless network in campus with other functions. It
uses one-way hash function to generate the summary of information, and it uses public
key mechanism to encrypt the sending information. This scheme introduces the function
of each mode detailed, and analyzes the performance, including a comparison with other
scheme. At last, this scheme is uses in an embedded 24 security gateway, and we test the
scheme, discuss the scheme’s future.
In this paper, it analysis the properties of the scheme in detailed and compared with
other schemes. After the system function testing and performance testing, we can find
that the security of the proposed model for identity authentication has improved and
certification faster. The efficiency of the server certificate is improved because of
multithreading.
Key words: dynamic password authentication, identity authentication,
public key scheme, hash function, challenge/response
目 录
中文摘要
ABSTRACT
第一 ......................................................................................................................1
§1.1 题的研究背景和意义........................................................................................................1
§1.2 研究现与应用......................................................................................................................2
§1.3 主要..................................................................................................................................2
§1.3.1 研究内
............................................................................................................................2
§1.3.2 本文的结构
................................................................................................................3
二章 身份认证技术及密码学相关知识......................................................................4
§2.1 主流身份认证技术.....................................................................................................................4
§2.1.1
消息摘要
................................................................................................................................4
§2.1.2
数字信
................................................................................................................................5
§2.1.3
数字签名
................................................................................................................................6
§2.1.4
数字证
................................................................................................................................8
§2.2 身份认证方案及安全性分析.....................................................................................................9
§2.2.1
基于口令的传统认证机制
....................................................................................................9
§2.2.2
基于
PKI
的认证机制
...........................................................................................................10
§2.2.3 802.1X
认证协议
..................................................................................................................12
§2.2.4 Kerberos...............................................................................................................................13
§2.2.5
挑战
/
应答的认证机制
........................................................................................................14
三章 嵌入式内网身份认证系统的方案设计............................................................18
§3.1 设计需求..................................................................................................................................19
§3.1.1
安全性能需求分析
..............................................................................................................19
§3.1.2
技术需求
..............................................................................................................................19
§3.2 方案详细设计..........................................................................................................................20
§3.2.1
设计思路
..............................................................................................................................20
§3.2.2
方案
..............................................................................................................................20
§3.3 方案评价分析..................................................................................................................24
§3.3.1
安全性分析
..........................................................................................................................24
§3.3.2
性能分析
..............................................................................................................................25
四章 嵌入式内网身份认证系统的实现....................................................................26
§4.1 需求分析..................................................................................................................................26
§4.1.1
设计意义
..............................................................................................................................26
§4.1.2
功能需求
..............................................................................................................................26
§4.1.3
系统的性能需求分析
..........................................................................................................27
§4.1.4
接口的需求分析
..................................................................................................................27
§4.2 嵌入式内网身份认证系统设计...............................................................................................28
§4.2.1
服务器实现的功能模
......................................................................................................28
§4.2.2
无线用户的功能模
......................................................................................................32
§4.3 嵌入式内网身份认证系统的实现...........................................................................................32
§4.4 系统测试..................................................................................................................................33
§4.4.1
功能测试
..............................................................................................................................33
§4.4.2
性能测试
..............................................................................................................................35
五章 果与........................................................................................................37
§5.1 本文的研究重点及创新.......................................................................................................37
§5.2 ..........................................................................................................................................37
参考.........................................................................................................................39
摘要:

嵌入式内网身份认证的实现方法研究摘要用户的身份认证是其他网络安全措施的基础,是无线网络安全的第一道门槛,因而身份认证对无线网络安全来讲是至关重要的,如果身份认证出现问题,那么整个无线网络的其他安全措施就没有任何意义了。无线校园网络飞速发展,无线网络的应用日益广泛,校园网面临的安全问题也日趋严峻。所以如何确定用户的身份从而控制用户对信息资源的访问,保证无线网络访问者的合法性,是一个值得深入研究讨论的问题,是目前无线网络安全的重要研究方向。本论文首先对保障无线校园网网络安全所涉及的问题,如:密码学知识、身份认证技术和认证协议进行了理论探讨,阐述了各种身份认证技术的基本原理和实现方法,然后对局域网网...

展开>> 收起<<
嵌入式内网身份认证的实现方法研究.doc

共40页,预览4页

还剩页未读, 继续阅读

作者:高德中 分类:高等教育资料 价格:15积分 属性:40 页 大小:1.72MB 格式:DOC 时间:2024-11-19

开通VIP享超值会员特权

  • 多端同步记录
  • 高速下载文档
  • 免费文档工具
  • 分享文档赚钱
  • 每日登录抽奖
  • 优质衍生服务
/ 40
客服
关注