Resource Access Non-Repudiation in Wireless Network
碩士 === 國立中正大學 === 資訊管理學系 === 91 === “Mobile communication” will be no longer Arabian Nights in the conditions of rapid advancements of information technology. For the compatibility between traditional wired network and mobile network, IETF (Internet Engineering Task Force, 1996) proposed a protocol...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2003
|
Online Access: | http://ndltd.ncl.edu.tw/handle/84349861025657742595 |
id |
ndltd-TW-091CCU00396037 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-091CCU003960372016-06-24T04:15:54Z http://ndltd.ncl.edu.tw/handle/84349861025657742595 Resource Access Non-Repudiation in Wireless Network 適用於無線網路環境下之不可否認性資源存取機制之研究 林敬筠 碩士 國立中正大學 資訊管理學系 91 “Mobile communication” will be no longer Arabian Nights in the conditions of rapid advancements of information technology. For the compatibility between traditional wired network and mobile network, IETF (Internet Engineering Task Force, 1996) proposed a protocol based on the mobility characteristics of mobile communication, it’s called Mobile IP. In this study, we proposed a mechanism of security authentication, which provides confidentiality, integrity and authentication of information security. The most important of all is it suggests the Non-Repudiation of resource in the mobile environment. The mechanism servers as three parts: Home Network Authentication (HNA), Foreign Network Authentication (FNA) and Resource Access Authentication (RAA). We used RSA to validate the uniqueness of Mobile Node (MN) at the registration. When MN moving out to external network, we use handshaking and security key to validate the uniqueness and validity of MN, they can confirm the MN with capability of accessing. For the sake of Non-Repudiation, in the circumstance of accessing resource, the messages released by MN must contain the certificate from Foreign Agent (FA). With the certificate from FA, the MN cannot deny its accessing actions, the registration also provides the ability of managing resource. The mixture of RSA and secret key performed well in confidentiality and integrity. The mechanism of this study, in addition, replaced Home Agent (HA) with Certification Authority (CA), provide the validity of public key of MN in the mean of handshaking. The replacement of CA could facilitate time saving and cost reducing without communication with remote host. Besides problems inherent in traditional electronic commerce, there are still many issues about security to be addressed in Mobile Commerce, that’s the reason we suggest the mechanism of Non-reputation in the study. 古政元 2003 學位論文 ; thesis 72 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中正大學 === 資訊管理學系 === 91 === “Mobile communication” will be no longer Arabian Nights in the conditions of rapid advancements of information technology. For the compatibility between traditional wired network and mobile network, IETF (Internet Engineering Task Force, 1996) proposed a protocol based on the mobility characteristics of mobile communication, it’s called Mobile IP.
In this study, we proposed a mechanism of security authentication, which provides confidentiality, integrity and authentication of information security. The most important of all is it suggests the Non-Repudiation of resource in the mobile environment. The mechanism servers as three parts: Home Network Authentication (HNA), Foreign Network Authentication (FNA) and Resource Access Authentication (RAA). We used RSA to validate the uniqueness of Mobile Node (MN) at the registration. When MN moving out to external network, we use handshaking and security key to validate the uniqueness and validity of MN, they can confirm the MN with capability of accessing. For the sake of Non-Repudiation, in the circumstance of accessing resource, the messages released by MN must contain the certificate from Foreign Agent (FA). With the certificate from FA, the MN cannot deny its accessing actions, the registration also provides the ability of managing resource.
The mixture of RSA and secret key performed well in confidentiality and integrity. The mechanism of this study, in addition, replaced Home Agent (HA) with Certification Authority (CA), provide the validity of public key of MN in the mean of handshaking. The replacement of CA could facilitate time saving and cost reducing without communication with remote host.
Besides problems inherent in traditional electronic commerce, there are still many issues about security to be addressed in Mobile Commerce, that’s the reason we suggest the mechanism of Non-reputation in the study.
|
author2 |
古政元 |
author_facet |
古政元 林敬筠 |
author |
林敬筠 |
spellingShingle |
林敬筠 Resource Access Non-Repudiation in Wireless Network |
author_sort |
林敬筠 |
title |
Resource Access Non-Repudiation in Wireless Network |
title_short |
Resource Access Non-Repudiation in Wireless Network |
title_full |
Resource Access Non-Repudiation in Wireless Network |
title_fullStr |
Resource Access Non-Repudiation in Wireless Network |
title_full_unstemmed |
Resource Access Non-Repudiation in Wireless Network |
title_sort |
resource access non-repudiation in wireless network |
publishDate |
2003 |
url |
http://ndltd.ncl.edu.tw/handle/84349861025657742595 |
work_keys_str_mv |
AT línjìngyún resourceaccessnonrepudiationinwirelessnetwork AT línjìngyún shìyòngyúwúxiànwǎnglùhuánjìngxiàzhībùkěfǒurènxìngzīyuáncúnqǔjīzhìzhīyánjiū |
_version_ |
1718322748560769024 |