Dissertation > Excellent graduate degree dissertation topics show

The Research and Application on IPv6Security Management Techniques of Group Members

Author: WuZuoTian
Tutor: ChenYue
School: PLA Information Engineering University
Course: Applied Computer Technology
Keywords: IPv6Network Dynamic Threshold Secret Sharing Scheme Group Key Manage-ment Identity Authentication Access Control
CLC: TP393.08
Type: Master's thesis
Year: 2012
Downloads: 10
Quote: 0
Read: Download Dissertation

Abstract


With the increasing development and improvement of IPv6technology, as well as themulticast applications, higher requirements have been put forward for multicast security in thecomplex Internet environment. One of the most important key points is the securitymanagement of group members. Currently, multicast technology research in the IPv4networkenvironment has been much mature, however, the research and application on IPv6securitymanagement techniques of group members is still in its initial stage, and the standards have notbeen unified. In response to this situation, researching Multicast security in the new generationof trusted Internet to achieve the security management of group members is of great value.Based on In-depth study of the dynamic threshold secret sharing scheme, threshold-basedgroup key management scheme is proposed. In the IPv6network environment, Correspondingsolutions are proposed toward the key link in the process of multicast receiver access control toachieve secure multicast, and also to reduce the impact on network performance when thegroup members join in or leave from the group frequently. In this paper, research works thathave finished are as follows:1. Threshold-based group key management and access control scheme applied to the LANand other shared media. The leak of Group key can easily threaten the security of the entireenvironment of LAN and other shared media. Therefore, propose a non-symmetric mode usingthe idea of Shamir threshold encryption to implement group key distribution, encryption anddecryption. This scheme called Group Key Management based on Threshold can achieve LANaccess control, and make it possible that group members holding different group keys canrestore the same encrypted multicast data. The original program can be expanded to LGKMTby adding the sub-group key controller, which can expand the scheme apply to large-scalemulticast application environment.2. Secure Control of Multicast Client. For the lack of security and effective management ofgroup members in the current IPv6network environment, propose an identification schemeabbreviated to ISMC which is applied to multicast environment and a channel-based accesscontrol scheme abbreviated to EAP-OTP which is applied to the IPv6network. To constructIPv6Secure Control of Multicast Client system abbreviated to SCMC combining with LGKMTscheme. This system can provide security and effective management in the process of user loginand channel access, prescribe the legitimate users’ permissions to avoid unauthorized users’malicious occupancy of multicast resources and the attacker’s destruction of multicast system.3. The design and implementation process of the SCMC system will be proposed. The detail method and steps of SCMC system will be described from the perspective of server,access router and client; and the description of the functions and the variables will beintroduced from the perspective of object-oriented; and finally, the implementation ofEAP-OTP scheme from the SCMC system will be analyzed through the way of the statediagram.Finally, SCMC system is successfully deployed on CERNET2, which verify the maintechniques and methods of security group membership management.

Related Dissertations

  1. Study on Channel Allocation of Multi-Channel MAC Protocol in Ad-Hoc Network,TN929.5
  2. The Design and Implementation of DICOM Middle Software and Access Control Model in Formation Integration Platform,TP311.13
  3. Research on MAC Protocol for WIreless Sensor Network,TN915.04
  4. Study on the Access Control of the Court Information System,TP309
  5. The Research and Application of IPTV Terminal System Based on the Next Generation of Internet,TN949.292
  6. Based on WINDOWS platform file security mechanism,TP309
  7. The Design and Implementation of Higher People’s Court Website That Based on Component and ASP Technology,TP311.52
  8. Research on Working Vacations Strategy of WLAN MAC Layer,TN925.93
  9. Multi-user Access Control Strategy for Power Distribution Network Based on OFDM,TN919.3
  10. Research of Security Application in Enterprise Based on PKI Technology,TP393.08
  11. Access Control System Design Based on Palm Vein Technology,TP273.5
  12. A Design Study of PLC Elevator Access Control System Based on RFID,TP273.5
  13. University Office System Design and Implementation,TP311.52
  14. Application and Research of Transparent Encryption Technology Based on ERM,TP309.7
  15. Design and Implementation of Control Category Components of Database Access Based on .NET,TP311.52
  16. Research of Multi-RVM Based on Locality Preserving Kernel in Speaker Recognition,TN912.34
  17. Research on Safety of Sensitive Data in OA System,TP317.1
  18. An Identity Certification System for the Online Banking Based on Fingerprint Recognition and PKI,TP393.09
  19. Design and Implementation of Zhaoqing S & T Polytechnic Online Examination System Base on Computer Basis,TP311.52
  20. UCON-Based Access Control Model and Application in IoT Environment,TP393.08
  21. Design and implementation of civil explosive industry online procurement system,TP311.52

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile