Resource Access Non-Repudiation in Wireless Network

碩士 === 國立中正大學 === 資訊管理學系 === 91 === “Mobile communication” will be no longer Arabian Nights in the conditions of rapid advancements of information technology. For the compatibility between traditional wired network and mobile network, IETF (Internet Engineering Task Force, 1996) proposed a protocol...

Full description

Bibliographic Details
Main Author: 林敬筠
Other Authors: 古政元
Format: Others
Language:zh-TW
Published: 2003
Online Access:http://ndltd.ncl.edu.tw/handle/84349861025657742595
id ndltd-TW-091CCU00396037
record_format oai_dc
spelling ndltd-TW-091CCU003960372016-06-24T04:15:54Z http://ndltd.ncl.edu.tw/handle/84349861025657742595 Resource Access Non-Repudiation in Wireless Network 適用於無線網路環境下之不可否認性資源存取機制之研究 林敬筠 碩士 國立中正大學 資訊管理學系 91 “Mobile communication” will be no longer Arabian Nights in the conditions of rapid advancements of information technology. For the compatibility between traditional wired network and mobile network, IETF (Internet Engineering Task Force, 1996) proposed a protocol based on the mobility characteristics of mobile communication, it’s called Mobile IP. In this study, we proposed a mechanism of security authentication, which provides confidentiality, integrity and authentication of information security. The most important of all is it suggests the Non-Repudiation of resource in the mobile environment. The mechanism servers as three parts: Home Network Authentication (HNA), Foreign Network Authentication (FNA) and Resource Access Authentication (RAA). We used RSA to validate the uniqueness of Mobile Node (MN) at the registration. When MN moving out to external network, we use handshaking and security key to validate the uniqueness and validity of MN, they can confirm the MN with capability of accessing. For the sake of Non-Repudiation, in the circumstance of accessing resource, the messages released by MN must contain the certificate from Foreign Agent (FA). With the certificate from FA, the MN cannot deny its accessing actions, the registration also provides the ability of managing resource. The mixture of RSA and secret key performed well in confidentiality and integrity. The mechanism of this study, in addition, replaced Home Agent (HA) with Certification Authority (CA), provide the validity of public key of MN in the mean of handshaking. The replacement of CA could facilitate time saving and cost reducing without communication with remote host. Besides problems inherent in traditional electronic commerce, there are still many issues about security to be addressed in Mobile Commerce, that’s the reason we suggest the mechanism of Non-reputation in the study. 古政元 2003 學位論文 ; thesis 72 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立中正大學 === 資訊管理學系 === 91 === “Mobile communication” will be no longer Arabian Nights in the conditions of rapid advancements of information technology. For the compatibility between traditional wired network and mobile network, IETF (Internet Engineering Task Force, 1996) proposed a protocol based on the mobility characteristics of mobile communication, it’s called Mobile IP. In this study, we proposed a mechanism of security authentication, which provides confidentiality, integrity and authentication of information security. The most important of all is it suggests the Non-Repudiation of resource in the mobile environment. The mechanism servers as three parts: Home Network Authentication (HNA), Foreign Network Authentication (FNA) and Resource Access Authentication (RAA). We used RSA to validate the uniqueness of Mobile Node (MN) at the registration. When MN moving out to external network, we use handshaking and security key to validate the uniqueness and validity of MN, they can confirm the MN with capability of accessing. For the sake of Non-Repudiation, in the circumstance of accessing resource, the messages released by MN must contain the certificate from Foreign Agent (FA). With the certificate from FA, the MN cannot deny its accessing actions, the registration also provides the ability of managing resource. The mixture of RSA and secret key performed well in confidentiality and integrity. The mechanism of this study, in addition, replaced Home Agent (HA) with Certification Authority (CA), provide the validity of public key of MN in the mean of handshaking. The replacement of CA could facilitate time saving and cost reducing without communication with remote host. Besides problems inherent in traditional electronic commerce, there are still many issues about security to be addressed in Mobile Commerce, that’s the reason we suggest the mechanism of Non-reputation in the study.
author2 古政元
author_facet 古政元
林敬筠
author 林敬筠
spellingShingle 林敬筠
Resource Access Non-Repudiation in Wireless Network
author_sort 林敬筠
title Resource Access Non-Repudiation in Wireless Network
title_short Resource Access Non-Repudiation in Wireless Network
title_full Resource Access Non-Repudiation in Wireless Network
title_fullStr Resource Access Non-Repudiation in Wireless Network
title_full_unstemmed Resource Access Non-Repudiation in Wireless Network
title_sort resource access non-repudiation in wireless network
publishDate 2003
url http://ndltd.ncl.edu.tw/handle/84349861025657742595
work_keys_str_mv AT línjìngyún resourceaccessnonrepudiationinwirelessnetwork
AT línjìngyún shìyòngyúwúxiànwǎnglùhuánjìngxiàzhībùkěfǒurènxìngzīyuáncúnqǔjīzhìzhīyánjiū
_version_ 1718322748560769024