跳到主要內容

臺灣博碩士論文加值系統

(34.204.169.230) 您好!臺灣時間:2024/02/21 22:02
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:鄧鴻毅
研究生(外文):Hung-Yi Teng
論文名稱:3G與WLAN整合式網路下認證與金鑰協議之研究
論文名稱(外文):The Study on Authenticated Key Agreement for 3G/WLANInterworking
指導教授:簡宏宇簡宏宇引用關係陳彥錚陳彥錚引用關係
指導教授(外文):Hung-Yu ChienYen-Cheng Chen
學位類別:碩士
校院名稱:朝陽科技大學
系所名稱:資訊管理系碩士班
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:英文
論文頁數:74
中文關鍵詞:匿名性錯誤更正碼認證第三代行動通訊無線區域網路
外文關鍵詞:WLANAuthenticationAnonymityError connection codes3G
相關次數:
  • 被引用被引用:3
  • 點閱點閱:452
  • 評分評分:
  • 下載下載:30
  • 收藏至我的研究室書目清單書目收藏:1
第三代行動通訊系統 (3G) 預期能為行動用戶提供更優質的多媒體影音串流服務,卻仍受限於資料傳輸速度有限與建置成本過高等因素。另一方面,由於無線區域網路 (WLAN) 具備了較高的資料傳輸速度與建置容易等特性,目前無線上網服務業者 (WISP) 正加快腳步在許多人潮密集的地區部署WLAN,俗稱熱點 (Hotspot),然而WLAN無法有效益地提供廣域服務。為了增加收益與提升用戶滿意度,3G業者希望藉由WLAN與3G系統互補的優勢,能夠在熱點與校園內提供多樣化的影音服務。如此一來,一個有效率地認證協定將是整合3G與WLAN的一項成功關鍵因素。在本研究中,我們將先探討在3G/WLAN整合式網路下的認証協定須具備的特性- 高效率、匿名性等等;接著我們分別提出於3G/WLAN整合式網路下具有效率性的認証協定與具備匿名性的高效率協定。除此之外,我們已建置一實驗環境去收集實務環境下的數據及驗證EAP-TLS、W-SKE與所設計之協定的效能。
The third-generation cellular network (3G) provides higher data capacity to support new services (videophone or video streaming) (up to 2Mb/s) than 2G cellular network, but it suffers from limited data rate and expensive deployment. In contrast, wireless local area networks (WLANs) are deployed widely in small areas or hotspots, because of their cost-effectiveness, ease of deployment and high data rates (802.11g up to 54 Mb/s) in an unlicensed frequency band. However, WLAN can not provide the wide coverage cost-efficiently like 3G does. In order to provide large varieties of services at high data rate in the hotspots and campus-wide areas, 3G service providers regard WLAN as a technology to compliment their 3G system. Thus, efficient authentication and dynamic key exchange protocols that support heterogeneous domains as well as networks with roaming agreements across trust boundaries are crucial to the success of 3G/WLAN interworking. As a result, in this study, we identify the requirements for authenticated key exchange protocols in integrated 3G/WLAN networks. And, we propose an efficient authentication protocol for integrated 3G/WLAN networks that can greatly improve the security and the communication performance, and an anonymous authenticated key exchange protocol for those anonymous services in integrated 3G/WLAN networks. In order to gather data from a running system and verify our design and analysis, we have set up an experimental environment. In this environment, we collect the related data and analyze EAP-AKA, W-SKE and our proposed protocols.
中文摘要 (Abstract in Chinese) I
Abstract II
Acknowledgements III
CHAPTER 1 Introduction 1
1.1 Research Background and Motivation 1
1.2 Research Approach and Scope 3
1.3 Thesis Organization 4
CHAPTER 2 Literatures Review 5
2.1 Related Theories and Schemes 5
2.1.1 Symmetric Cryptosystem 5
2.1.2 One-way Hash Function 5
2.1.2.1 One-way Hashed Chain 6
2.1.3 Message Authentication Code 6
2.1.4 The Challenge-Response Mechanism 7
2.1.5 Error Correction Codes 8
2.2 Authentication in the existed 3G and WLAN network 10
2.2.1 UMTS Network 10
2.2.2 WLAN Network 13
CHAPTER 3 3G/WLAN Interworking 18
3.1 Interworking Model 18
3.2 Interworking Scenarios 20
3.3 Interworking Architectures 22
3.4 Requirements for 3G/WLAN Interworking 26
3.5 Previous Works 27
3.5.1 EAP-AKA 27
3.5.2 W-SKE 31
CHAPTER 4 Efficient Authentication Protocols for 3G/WLAN Interworking 35
4.1 Network Architecture 35
4.2 Authentication Model 36
4.3 Highly Efficient Authenticated Key Agreement in Integrated 3G/WLAN IP Networks 37
4.3.1 Security analysis 46
4.3.2 Performance evaluation 49
4.4 An Efficient Authentication Protocol with Perfect Anonymity for 3G/WLAN Interworking 53
4.4.1 Security analysis 62
4.4.2 Performance analysis 64
CHAPTER 5 Experiments 66
5.1 The Experimental Environment 66
5.2 Evaluation of our proposed protocols in our environment 67
CHAPTER 6 Conclusions and Future Works 69
Bibliography 70
Vita 74
[1] 3GPP(2002), “General Packet Radio Service (GPRS); Service Description,” Tech. spec. 3GPP TS 23.060 v3.12.0.
[2] 3GPP(2003), Feasibility study on 3GPP system to wireless local area network (WLAN) interworking (Release 6), 3GPP TR 22.934 v. 6.2.0.
[3] 3GPP(2004), 3G System to WLAN Interworking; System Description (Release 6), 3GPP TS 23.234 v6.0.0.
[4] 3GPP(2005), 3G security; security architecture(Release 6), 3GPP TS 33.102 v. 6.6.0.
[5] A. K. Salkintzis(2004), “Interworking techniques and architectures for WLAN/3G integration toward 4G mobile data networks,” IEEE Wireless Communications, Volume: 11 , Issue: 3 , Pages:50 – 61.
[6] A. Palekar, D. Simon, J. Salowey, H. Zhou, G. Zorn and S. Josefsson(2004), Protected EAP Protocol (PEAP) Version 2, Internet Draft (Work in progress), draft-josefsson-pppext-eap-tls-eap-10.
[7] A.K. Saltkintzis, C. Fors and R. Pazhyannu(2002), “WLAN-GPRS integration for next-generation mobile data networks,” IEEE Wireless Communications, Volume 9, Issue 5, Page(s):112 – 114.
[8] B. Aboba and D. Simon(1999), PPP EAP TLS Authentication Protocol, RFC 2716.
[9] B. Aboba, L. Blunk, J. Vollbrecht, Carlson, J., and H. Levkowetz(2004), PPP Extensible Authentication Protocol (EAP), RFC 3784.
[10] C. Rigney et al.(2000), Remote Authentication Dial in User Service (RADIUS), RFC 2865.
[11] Chang-Seop Park(1989), “Improving code rate of McEliece public-key cryptosystem,” Electronics Letters, Volume: 25, Issue: 21, Pages: 1466–1467.
[12] Chang-Seop Park(2004), “Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems,” Computer Networks, Volume: 44, Issue: 2, Pages: 267–273.
[13] D. I. Axiotis, T. Al-Gizawi, K. Peppas, E. N. Protonotarios, F. I. Lazarakis, C. Papadias and P. I. Philippopoulos(2004), “Services in interworking 3G and WLAN environments,” IEEE Wireless Communications, Volume 11, Issue 5, Page(s):14 – 20.
[14] ETSI TR 101 957(2001), “Broadband Radio Access Networks (BRAN), HIPERLAN Type 2: Requirements and Architectures for Interworking between HIPERLAN/2 and 3rd Generation Cellular Systems.”
[15] F. Fitzek, M. Munari, V. Pastesini, S. Rossi and L. Badia(2003), “Security and authentication concepts for UMTS/WLAN convergence,” Vehicular Technology Conference, 2003. VTC 2003-Fall. 2003 IEEE 58th, Volume 4, Page(s):2343 – 2347.
[16] G. Kambourakis, A. Rouskas, G. Kormentzas and S. Gritzalis(2004), “Advanced SSL/TLS-based authentication for secure WLAN-3G interworking,” Communications, IEE Proceedings, Vol.151, pp.501-506.
[17] G. M. Koien and T. Haslestad(2003), “Security aspects of 3G-WLAN interworking,” IEEE Communications Magazine, Volume: 41 , Issue: 11 , Pages:82 – 88.
[18] G. Ruggeri, A. Iera and S. Polito(2005), “802.11-Based Wireless-LAN and UMTS interworking: requirements, proposed solutions and open issues,” Computer Networks, Volume: 47, Issue: 2, pp. 151-166.
[19] H. Haverinen and J. Salowey(2004), Extensible Authentication Protocol Method for GSM Subscriber Identity Modules (EAP-SIM), Internet Draft (Work in progress), draft-haverinen-pppext-eap-sim-14.
[20] H. Honkasalo, K. Pehkonen, M. T. Niemi and A.T. Leino(2002), “WCDMA and WLAN for 3G and beyond,” IEEE Wireless Communications, Volume 9, Issue 2, Page(s):14 – 18.
[21] IEEE Std 802.11(1999), Wireless LAN medium Access Control (MAC) and Physical Layer (PHY) Specifications.
[22] IEEE Std 802.11i(2004), Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Security Enhancements.
[23] IEEE Std 802.1X(2001), Port-Based Network Control.
[24] J. Arkko and H. Haverinen(2004), “Extensible Authentication Protocol Method for UMTS Authentication and Key Agreement (EAP-AKA),” Internet Draft (Work in progress), draft-arkko-pppext-eap-aka-12.
[25] J. Carlson, B. Aboba and H. Haverinen(2001), EAP SRP-SHA1 Authentication Protocol, Internet Draft (Work in progress), draft-ietf-pppext-eap-srp-03.
[26] K. Ahmavaara, H. Haverinen and R. Pichna(2003), “Interworking Architecture Between 3GPP and WLAN Systems,” IEEE Communications Magazine, Volume 41, Issue 11, Page(s):74 – 81.
[27] L. Salgarelli, M. Buddhikot, J. Garay, S. Patel and S. Miller(2003), “Efficient authentication and key distribution in wireless IP networks,” IEEE Wireless Communications, Volume: 10 , Issue: 6 , Pages:52 – 61.
[28] MasterCard and VISA(1997), Secure Electronic Transaction (SET) Specification Book 1 Business Description.
[29] NBS(1977), Data Encryption Standard, FIPS PUB 46
[30] NIST(1993), Secure Hash Standard, FIPS PUB 180.
[31] NIST(2001), Advanced Encryption Standard, FIPS PUB 197.
[32] P. Calhoun et al.(2003), Diameter Base Protocol, RFC 3588.
[33] P. Funk and S. Blake-Wilson(2004), “EAP Tunneled TLS Authentication Protocol (EAP-TTLS),” Internet Draft (Work in progress), draft-ietf-pppext-eap-ttls-05.
[34] P. Prasithsangaree and P. Krishnamurthy(2004), “A new authentication mechanism for loosely coupled 3G-WLAN integrated networks,” IEEE Vehicular Technology Conference, pp.2998-3003.
[35] R. L. Rivest(1992), The MD5 Message Digest Algorithm, RFC 1321.
[36] T. Dierks and C. Allen(1998), The TLS Protocol Version 1.0, RFC 2246.
[37] T.M. Cover(1973), “Enumerative source encoding,” IEEE Transactions on Information Theory, Volume: 19, Issue: 1, Pages: 73–77.
[38] Yuh-Min Tseng, Chou-Chen Yang and Jiann-Haur Su(2004), “An efficient protocol for integrating WLAN and Cellular Networks,” Advanced Communication Technology, The 6th International Conference on, pp.416-420.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 吳重禮、李世宏。2003。〈總統施政表現對於國會選舉影響之初探:以2001年立法委員選舉為例〉。《理論與政策》17,1:27-52。
2. 徐火炎。1999。〈李登輝情結的政治心理與選民的投票行為〉。《選舉研究》5,2:35-71。
3. 徐火炎。1992。〈民主轉型過程中的政黨重組:台灣地區選民的民主價值取向、政黨偏好與黨派投票改變之研究〉。《人文及社會科學集刊》5,1:213-263。
4. 鄭夙芬、陳陸輝、劉嘉薇。2005。〈2004年總統選舉中的候選人因素〉。《臺灣民主季刊》2,2:31-70。
5. 傅明穎。1998。〈北巿選民的候選人評價與投票決定〉。《臺灣政治學刊》3:195-243。
6. 徐永明。2005。〈2005年臺灣三合一選舉評析〉。《臺灣民主季刊》2,4:135-45。
7. 徐火炎。2004。〈臺灣結、中國結與臺灣心、中國情:臺灣選舉中的符號政治〉。《選舉研究》11,2:01-41。
8. 王甫昌。2002。〈族群接觸機會?還是族群競爭?本省閩南人族意識內涵與地區差異模式之解釋〉。《臺灣社會學研究》4:11-74。
9. 陳陸輝。2000。〈臺灣選民政黨認同的持續與變遷〉。《選舉研究》7,2:39-52。
10. 陳義彥。1995。〈不同族群政治文化的世代分析〉。《政治學報》24:83-121。
11. 陳義彥。1994。〈我國選民投票抉擇的影響因素-從民國82年縣巿長選舉探析〉。《政治學報》23:81-132。
12. 陳世敏。1992。〈候選人形象與選民投票行為〉。《新聞學研究》46:149-168。
13. 梁世武。1994。〈1994年臺北巿長選舉之預測:「候選人形象指標」預測模式之驗證〉。《選舉研究》1,2:97-129。
14. 莊天憐。2001。〈我國獨立選民的發展與變遷1989∼1999〉。《選舉研究》8,1:71-115。
15. 盛治仁。2001。〈即時資訊處理模型與投票行為研究的運用-以美國選民投票行為分析為例〉。《選舉研究》8,2:31-64。