天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

智慧家庭中多網(wǎng)絡融合終端安全關鍵技術研究

發(fā)布時間:2018-07-03 17:30

  本文選題:傳感器網(wǎng)絡 + WLAN-3G。 參考:《西安電子科技大學》2015年博士論文


【摘要】:智慧家庭中的終端設備通過網(wǎng)絡實現(xiàn)家庭內(nèi)部各種家用電子電器產(chǎn)品之間及其與外部設備的互聯(lián)互通,能夠便捷地實現(xiàn)互動娛樂、信息服務與智能控制,為家庭成員提供更加豐富的服務。隨著網(wǎng)絡技術和信息技術的發(fā)展,承載了多種網(wǎng)絡和多類業(yè)務的融合終端產(chǎn)品也越來越多。在各種網(wǎng)絡之間的信息交換,由于各網(wǎng)絡的目的、速率、覆蓋范圍、服務能力、應用對象、運營管理、安全方案等多個方面常常不一致。這些終端在進行互聯(lián)互通的時候,除了面臨原網(wǎng)絡的安全問題還引入了網(wǎng)絡融合時的安全問題。本論文的主要研究解決傳感網(wǎng)絡與互聯(lián)網(wǎng)進行融合時的用戶認證問題,無線局域網(wǎng)與移動互聯(lián)網(wǎng)的融合時的用戶認證問題,剖析了具有代表性的多網(wǎng)絡融合終端產(chǎn)品智能電視終端的安全問題,并提出了相應的解決方案。為了系統(tǒng)的分析和解決在智慧家庭中多網(wǎng)絡融合終端所面臨的安全問題,研究對象選取了智慧家庭的三大核心網(wǎng)絡(傳感器網(wǎng)絡、移動通信網(wǎng)、WLAN)及相應的終端產(chǎn)品。本文中研究的主要內(nèi)容包括:傳感器網(wǎng)絡自身的安全問題;傳感器網(wǎng)絡與互聯(lián)網(wǎng)在融合時的安全;移動通信網(wǎng)與WLAN融合的安全問題及終端在應用中的安全問題。其中傳感器網(wǎng)絡是智慧家庭中最核心的數(shù)據(jù)采集網(wǎng)絡,傳感器網(wǎng)絡的應用是智慧家庭的最重要特征,它的安全對于智慧家庭安全非常重要。傳感器網(wǎng)絡采集的數(shù)據(jù)需要同互聯(lián)網(wǎng)進行交換處理,這就需要對他們?nèi)诤蠒r的安全問題進行研究。隨著智能終端的大量應用,移動通信網(wǎng)如何同WLAN進行無縫、安全的融合也變得非常重要。主要的研究方法是通過分析研究國內(nèi)外已有的主流協(xié)議或方法,分析其原理、特點和優(yōu)劣勢,在其基礎上進行改進,并通過分析和仿真對改進的協(xié)議和方法進行驗證。研究工作受到了國家自然科學基金-廣東聯(lián)合基金(U0835004):“數(shù)字家庭無線網(wǎng)絡體系結(jié)構(gòu)及兼容性理論與技術研究”;國家高技術研究發(fā)展計劃(863計劃):“新一代數(shù)字電視關鍵技術研究及驗證(2012AA011706)”的資助。論文主要包括四個部分的內(nèi)容:第一部分的研究主要針對現(xiàn)有傳感器網(wǎng)絡的網(wǎng)絡體系結(jié)構(gòu)、主要威脅模型、常見的傳感器網(wǎng)絡訪問控制方式進行研究。研究了傳統(tǒng)的訪問控制機制,分析了國內(nèi)外主流的訪問控制方式的特點,了解了其開銷大,終端節(jié)點容易被捕獲、易受拒絕攻擊和信息重放的缺陷,同時為了增加用戶數(shù)量、訪問能力的可擴展性以及抵制用戶捕獲攻擊,研究了訪問控制方式和用戶訪問能力撤銷方式,相關機制在開銷不變的情況下提高了相關的安全能力,具有更加豐富的應用場景。第二部分研究主要針對傳感器網(wǎng)絡與互聯(lián)網(wǎng)融合的安全問題。分析了他們在融合時的主要安全問題,針對其中動態(tài)用戶認證協(xié)議的安全問題進行了深入研究,在分析國內(nèi)外主流的動態(tài)用戶認證協(xié)議的基礎上。設計了一種新的動態(tài)用戶認證協(xié)議,進行了改進。改進的協(xié)議在保持協(xié)議輕量、高效特點的同時,增強了防御偽裝網(wǎng)關重放攻擊,拒絕服務攻擊的能力,而且口令的更新更加方便。第三部分研究主要針對移動通信網(wǎng)絡同WLAN融合中出現(xiàn)的問題。針對該問題,選取3G作為移動通信的代表技術。對目前已有的融合方案:第三代合作伙伴計劃(3GPP)組織針對移動通信與WLAN網(wǎng)絡融合提出的互聯(lián)方案和三種互聯(lián)結(jié)構(gòu)及可擴展認證和秘鑰協(xié)商協(xié)議(EAP-AKA)方案進行分析。針對EAP-AKA協(xié)議存在的問題,引入了我國自主知識產(chǎn)權WAPI-移動通信網(wǎng)的互聯(lián)結(jié)構(gòu)模型,并在其基礎上設計了認證協(xié)議EAP-WAPI。針對其統(tǒng)一接入認證問題,文中對該方案進行改進。分析和仿真結(jié)果表明,相比于原有的WAPI認證協(xié)議WAPI-XG1,EAP-WAPI協(xié)議改進了認證交互過程,提高了執(zhí)行效率。第四部分研究主要針對傳統(tǒng)家電設備日益網(wǎng)絡、智能化、融合化所面臨的安全問題進行分析,選取了家庭中研究較少,比較有代表性的產(chǎn)品--智能電視進行了研究。指出了智能電視所面臨的安全威脅和安全系統(tǒng)架構(gòu)。并設計了一套身份認證管理系統(tǒng)的架構(gòu)和流程。智能電視安全問題和威脅分析的部分內(nèi)容被吸納進我國智能電視行業(yè)標準中,安全系統(tǒng)的設計也為標準的研制提供了有效的素材。同時對研究內(nèi)容轉(zhuǎn)化為標準也進行了有益的探索和嘗試。
[Abstract]:The terminal equipment in the intelligent family realizes intercommunication between various household electronic and electrical products within the family and its external equipment through the network. It can conveniently realize interactive entertainment, information service and intelligent control, and provide more rich services for family members. With the development of network and information technology, it carries a variety of networks. There are more and more terminal products of collaterals and multi class services. The exchange of information between various networks is often inconsistent with the goals, rates, coverage, service capabilities, application objects, operation management, and security schemes of each network. These terminals are confronted with the security problems of the original network when they are interconnected. The main research of this paper is to solve the user authentication problem of the fusion of the sensor network and the Internet, the problem of user authentication when the wireless LAN and the mobile Internet are fused, and analyze the security problems of the representative multi network fusion terminal product intelligent TV terminal. In order to systematically analyze and solve the security problems faced by the multi network fusion terminal in the intelligent family, the research object selected three core networks of the intelligent family (sensor network, mobile communication network, WLAN) and the corresponding terminal products. The main contents of this paper include: the sensor network itself Security issues; the security of the fusion of sensor networks and the Internet, the security problems of the fusion of mobile communication networks and the WLAN and the security of the terminal in the application. The sensor network is the most important data collection network in the intelligent family, and the application of the sensor network is the most important feature of the Hui's house, and its security is to the intelligent Hui's home The security of the network is very important. The data collected by the sensor network needs to be exchanged with the Internet. This needs to study the security problems of their fusion. With the large application of the intelligent terminal, it is not very important how the mobile communication network can be seamless and secure with the WLAN. The main research method is through the analysis and research. Study the principles, characteristics and advantages and disadvantages of the existing mainstream protocols and methods at home and abroad. On the basis of their improvement, the improved protocols and methods are verified by analysis and simulation. The research is subject to the National Natural Science Foundation of Guangdong (U0835004): "digital home wireless network architecture and compatibility theory." Research and technology research "; national high technology research and development plan (863 plan):" the new generation of digital television key technology research and verification (2012AA011706) ". The paper mainly includes four parts: the first part of the research is mainly aimed at the network architecture of the existing sensor networks, the main threat models, the common sensors The traditional access control mode is studied. The traditional access control mechanism is studied, and the characteristics of the mainstream access control methods at home and abroad are analyzed. It is understood that its overhead is large, the terminal nodes are easily captured, the denial of attack and the replay of information are easy to be captured, and the scalability of the user's number, the accessibility of the access and the resistance to the users are also discussed. Capture attack, study access control mode and user access ability revocation mode, the related mechanism improves the relevant security ability and has a more rich application scene in the case of constant overhead. The second part mainly focuses on the security problem of the fusion of sensor networks and the Internet. The main security of their fusion is analyzed. On the basis of analyzing the mainstream dynamic user authentication protocol, a new dynamic user authentication protocol is designed and improved. The improved protocol enhances the replay of the defense camouflage gateway while maintaining the lightweight and high efficiency of the protocol. Attack, the ability to reject the service attack, and the update of the password is more convenient. The third part of the study mainly focuses on the problems arising from the fusion of mobile communication network and WLAN. In view of this problem, 3G is selected as the representative technology of mobile communication. The existing fusion scheme: the third generation partnership plan (3GPP) organization for mobile communication and W The interconnection scheme proposed by LAN network and the three interconnection structures and the extensible authentication and secret key negotiation protocol (EAP-AKA) are analyzed. In view of the problems existing in the EAP-AKA protocol, the interconnection structure model of the autonomous intellectual property WAPI- mobile communication network is introduced, and the authentication protocol EAP-WAPI. is designed on the basis of its unification. The analysis and simulation results show that, compared to the original WAPI authentication protocol WAPI-XG1, the EAP-WAPI protocol improves the authentication interaction process and improves the execution efficiency. The fourth part of the study mainly focuses on the security problems faced by the increasingly network, intelligence and fusion of traditional household appliances. Analysis, select the less research and more representative products in the family, smart TV. The security threat and security system architecture of smart TV are pointed out. The architecture and process of a set of identity authentication management system are designed. Some contents of smart TV security and threat analysis are absorbed into our country's intelligence. In the TV industry standard, the design of the security system also provides effective material for the development of standard. Meanwhile, it also makes useful exploration and try on the transformation of the research content into the standard.
【學位授予單位】:西安電子科技大學
【學位級別】:博士
【學位授予年份】:2015
【分類號】:TP212;TP393.08

【相似文獻】

相關期刊論文 前10條

1 鄒婷;下一代通信“網(wǎng)絡融合與匯聚國際論壇暨峰會”[J];世界電信;2004年06期

2 嚴益強;固網(wǎng)與3G網(wǎng)絡融合規(guī)劃研究[J];通信世界;2005年13期

3 帥o,

本文編號:2094431


資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/falvlunwen/zhishichanquanfa/2094431.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權申明:資料由用戶d4046***提供,本站僅收錄摘要或目錄,作者需要刪除請E-mail郵箱bigeng88@qq.com
国产视频在线一区二区| 五月婷婷欧美中文字幕| 国产免费一区二区三区不卡| 九九热国产这里只有精品| 久久天堂夜夜一本婷婷| 国产成人亚洲精品青草天美 | 欧美91精品国产自产| 日韩黄片大全免费在线看| 狠狠做五月深爱婷婷综合| 国产精品一区二区丝袜| 色婷婷亚洲精品综合网| 国产不卡的视频在线观看| 亚洲五月婷婷中文字幕| 福利一区二区视频在线| 亚洲欧洲精品一区二区三区| 一区二区三区日本高清| 亚洲精品国产美女久久久99 | 韩日黄片在线免费观看| 国产精品成人一区二区在线| 后入美臀少妇一区二区| 久久婷婷综合色拍亚洲| 午夜午夜精品一区二区| 成在线人免费视频一区二区| 热情的邻居在线中文字幕| 爽到高潮嗷嗷叫之在现观看| 国产乱久久亚洲国产精品| 日本在线高清精品人妻| 美女被后入视频在线观看| 国内精品一区二区欧美| 国产又色又爽又黄又大| 精品视频一区二区不卡| 久久精品国产亚洲av久按摩| 亚洲欧美日产综合在线网| 国产午夜福利在线免费观看| 日韩精品综合福利在线观看| 国产一区欧美一区日本道| 在线观看视频成人午夜| 九九九热视频最新在线| 午夜久久久精品国产精品| 亚洲专区一区中文字幕| 国产精品一区二区高潮|