未來(lái)網(wǎng)絡(luò)中跨層設(shè)計(jì)和分布式增強(qiáng)的移動(dòng)管理
發(fā)布時(shí)間:2021-01-26 02:35
在新一代信息網(wǎng)絡(luò)技術(shù)領(lǐng)域中,未來(lái)網(wǎng)絡(luò)(Future Networks)將是重要的發(fā)展趨勢(shì)與方向,成為各個(gè)國(guó)家優(yōu)先關(guān)注的重要領(lǐng)域,對(duì)未來(lái)網(wǎng)絡(luò)的研究已經(jīng)成為世界各國(guó)占領(lǐng)信息技術(shù)制高點(diǎn)、增強(qiáng)國(guó)際競(jìng)爭(zhēng)力的戰(zhàn)略性需求。未來(lái)網(wǎng)絡(luò)包含云計(jì)算和下一代網(wǎng)絡(luò),在這個(gè)網(wǎng)絡(luò)中,大量的移動(dòng)節(jié)點(diǎn)(MN)能夠跨越異構(gòu)網(wǎng)絡(luò)執(zhí)行動(dòng)態(tài)運(yùn)動(dòng)。動(dòng)態(tài)管理是當(dāng)前未來(lái)網(wǎng)絡(luò)研究的一個(gè)重要課題,本論文旨在為未來(lái)網(wǎng)絡(luò)設(shè)計(jì)有效的動(dòng)態(tài)管理機(jī)制,開(kāi)展了以下研究工作。針對(duì)高認(rèn)證時(shí)延和脆弱的流動(dòng)性的限制,提出一種新型安全的跨層的基于主機(jī)的移動(dòng)管理方案,即分級(jí)認(rèn)證密鑰管理(HAKM)。為了盡量減少在下一代網(wǎng)絡(luò)的認(rèn)證時(shí)延以及防止各種類(lèi)型的攻擊,本文結(jié)合會(huì)話(huà)發(fā)起協(xié)議(SIP)與分層移動(dòng)式IPv6(HMIPv6協(xié)議)來(lái)為會(huì)話(huà)移動(dòng)進(jìn)行本地認(rèn)證。實(shí)驗(yàn)結(jié)果表明,與現(xiàn)有方法比較,該方案具有更低的認(rèn)證時(shí)延和更高效的基于主機(jī)的移動(dòng)管理。針對(duì)基于網(wǎng)絡(luò)的移動(dòng)性,例如切換時(shí)延,分組丟失,并且認(rèn)證的復(fù)雜關(guān)聯(lián)的局限性,提出了一種新型的基于網(wǎng)絡(luò)的方案,即跨層本地化認(rèn)證機(jī)制(CLAM),這種機(jī)制可以集成代理移動(dòng)IPv6和SIP,在實(shí)時(shí)和非實(shí)時(shí)通信中進(jìn)行本地身份認(rèn)證。CLAM的基礎(chǔ)...
【文章來(lái)源】:大連理工大學(xué)遼寧省 211工程院校 985工程院校 教育部直屬院校
【文章頁(yè)數(shù)】:138 頁(yè)
【學(xué)位級(jí)別】:博士
【文章目錄】:
Abstract
摘要
Introduction
1 Background
1.1 Mobile Generations
1.2 Future Networks/Next Generation Networks(NGNs)
1.2.1 Service Awareness
1.2.2 Data Awareness
1.2.3 Environmental Awareness
1.2.4 Social and Economic Awareness
1.3 Mobility Management in Future Networks
1.3.1 Host-based Mobility Protocols
1.3.2 Network-based Mobility Protocols
1.3.3 Distributed Mobility Management
1.3.4 Session Mobility
1.4 Security of Mobility Management
1.5 Research Challenges
1.6 Summary
2 Secure Cross-layer Host-based Mobility Management
2.1 Introduction
2.2 Related Work
2.3 Hierarchical Authentication Key Management(HAKM)
2.4 Algorithm of HAKM
2.4.1 Initialization Phase
2.4.2 Authentication Phase
2.4.3 Secure Session Mobility Phase
2.5 Performance Analysis
2.5.1 Analytical Authenticated Mobility Models
2.5.2 Latency Analysis
2.6 Security Analysis
2.7 Results Comparison and Discussions
2.8 Summary
3 Secure Cross-layer Network-based Mobility Management
3.1 Introduction
3.2 Related Work
3.3 Network Architecture
3.4 Cross-layer Localized Authentication Mechanism
3.4.1 Registration
3.4.2 Login Phase
3.4.3 MN's Attachment and Authentication Phase
3.4.4 Handoff Phase
3.4.5 Session Key Update Phase
3.4.6 Password Change Phase
3.5 Performance Analysis
3.5.1 Handover Latency
3.5.2 Signaling Cost
3.5.3 Communication Overhead
3.5.4 Computational Cost
3.6 Security Analysis
3.7 Results Comparison and Discussions
3.7.1 Handover Latency
3.7.2 Signaling Cost
3.7.3 Packet Loss
3.8 Summary
4 Secure Distributed Mobility Management
4.1 Introduction
4.2 Related Work
4.3 Secure Network-based Distributed Mobility Management
4.3.1 Basic Design
4.3.2 Data Mobility Anchor Decision Process
4.3.3 Authentication
4.3.4 Dynamic Mobility Management
4.3.5 Optimized Routing
4.3.6 Handover
4.4 Performance Analysis
4.4.1 Handover Latency
4.4.2 Handover Blocking Probability
4.4.3 Packet Loss
4.4.4 Communication Overhead
4.4.5 Computational Cost
4.5 Security Analysis
4.6 Results Comparison and Discussions
4.6.1 Handover Latency
4.6.2 Handover Blocking Probability
4.6.3 Packet Loss
4.7 Summary
Conclusion
Abstract of Innovation Points
References
Appendix A List of Figures
Appendix B List of Tables
Appendix C Definitions of Major Terms
Published Academic Papers during PhD Period
Acknowledgement
About the Author
本文編號(hào):3000319
【文章來(lái)源】:大連理工大學(xué)遼寧省 211工程院校 985工程院校 教育部直屬院校
【文章頁(yè)數(shù)】:138 頁(yè)
【學(xué)位級(jí)別】:博士
【文章目錄】:
Abstract
摘要
Introduction
1 Background
1.1 Mobile Generations
1.2 Future Networks/Next Generation Networks(NGNs)
1.2.1 Service Awareness
1.2.2 Data Awareness
1.2.3 Environmental Awareness
1.2.4 Social and Economic Awareness
1.3 Mobility Management in Future Networks
1.3.1 Host-based Mobility Protocols
1.3.2 Network-based Mobility Protocols
1.3.3 Distributed Mobility Management
1.3.4 Session Mobility
1.4 Security of Mobility Management
1.5 Research Challenges
1.6 Summary
2 Secure Cross-layer Host-based Mobility Management
2.1 Introduction
2.2 Related Work
2.3 Hierarchical Authentication Key Management(HAKM)
2.4 Algorithm of HAKM
2.4.1 Initialization Phase
2.4.2 Authentication Phase
2.4.3 Secure Session Mobility Phase
2.5 Performance Analysis
2.5.1 Analytical Authenticated Mobility Models
2.5.2 Latency Analysis
2.6 Security Analysis
2.7 Results Comparison and Discussions
2.8 Summary
3 Secure Cross-layer Network-based Mobility Management
3.1 Introduction
3.2 Related Work
3.3 Network Architecture
3.4 Cross-layer Localized Authentication Mechanism
3.4.1 Registration
3.4.2 Login Phase
3.4.3 MN's Attachment and Authentication Phase
3.4.4 Handoff Phase
3.4.5 Session Key Update Phase
3.4.6 Password Change Phase
3.5 Performance Analysis
3.5.1 Handover Latency
3.5.2 Signaling Cost
3.5.3 Communication Overhead
3.5.4 Computational Cost
3.6 Security Analysis
3.7 Results Comparison and Discussions
3.7.1 Handover Latency
3.7.2 Signaling Cost
3.7.3 Packet Loss
3.8 Summary
4 Secure Distributed Mobility Management
4.1 Introduction
4.2 Related Work
4.3 Secure Network-based Distributed Mobility Management
4.3.1 Basic Design
4.3.2 Data Mobility Anchor Decision Process
4.3.3 Authentication
4.3.4 Dynamic Mobility Management
4.3.5 Optimized Routing
4.3.6 Handover
4.4 Performance Analysis
4.4.1 Handover Latency
4.4.2 Handover Blocking Probability
4.4.3 Packet Loss
4.4.4 Communication Overhead
4.4.5 Computational Cost
4.5 Security Analysis
4.6 Results Comparison and Discussions
4.6.1 Handover Latency
4.6.2 Handover Blocking Probability
4.6.3 Packet Loss
4.7 Summary
Conclusion
Abstract of Innovation Points
References
Appendix A List of Figures
Appendix B List of Tables
Appendix C Definitions of Major Terms
Published Academic Papers during PhD Period
Acknowledgement
About the Author
本文編號(hào):3000319
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/3000319.html
最近更新
教材專(zhuān)著