首页--工业技术论文--无线电电子学、电信技术论文--通信论文--通信保密与通信安全论文--保密通信:按传输线路分论文

Security for Heterogeneous Wireless Networks

Abstract第3-4页
Abstract (Chinese)第5-7页
Dedication第7-8页
Acknowledgements第8-12页
List of figures第12-13页
List of Tables第13-14页
Acronyms第14-16页
CHAPTER ONE: INTRODUCTION第16-23页
    1.1 Introduction of the thesis第16-19页
    1.2 Objectives and scope of the thesis第19页
    1.3 Importance of the study第19-20页
    1.4 Background of the problem第20-21页
    1.5 Thesis organization第21-23页
CHAPTER TWO Background of WLAN and its Security Concepts第23-42页
    2.1 Overview of Wireless LAN第23-29页
        2.1.1 Brief history of WLAN第23-24页
        2.1.2 Wireless LAN components第24页
        2.1.3 Wireless LAN requirements第24-25页
        2.1.4 Wireless LAN applications第25-26页
        2.1.5 Wireless LAN technology第26-28页
        2.1.6 Benefits of wireless LAN第28-29页
    2.2 IEEE 802.11 wireless LAN standard第29-32页
    2.3 IEEE 802.11 WLAN architecture第32-34页
    2.4 IEEE 802.11 Medium Access Control第34-40页
        2.4.1 Reliable Data Delivery第35-36页
        2.4.2 Shared Access Control第36-37页
        2.4.3 Security Considerations第37-40页
    2.5 IEEE Physical Layer第40-42页
CHAPTER THREE Background of 3G and its Security Concepts第42-56页
    3.1 Over view of 3G第42-45页
        3.1.1 Introduction of UMTS第42-44页
        3.1.2 The main differences between UMTS and GSM第44-45页
        3.1.3 UMTS Services第45页
    3.2 UMTS architecture第45-50页
        3.2.1 Core network第46-50页
            3.2.1.1 Circuit switched domains第47-48页
                3.2.1.1.1 Mobile services Switching Centre (MSC)第47页
                3.2.1.1.2 Visitor location register (VLR)第47页
                3.2.1.1.3 Gateway MSC (GMSC)第47-48页
            3.2.1.2 Packet switched domains第48-49页
                3.2.1.2.1 Serving GPRS Support Node (SGSN)第48页
                3.2.1.2.2 Gateway GPRS Support Node (GGSN)第48-49页
            3.2.1.3 Home Environment第49-50页
                3.2.1.3.1 Home location register (HLR)第49页
                3.2.1.3.2 Authentication Centre(AuC)第49-50页
                3.2.1.3.3 Equipment Identity Register. (EIR)第50页
    3.3 UMTS Terrestrial Radio Access Network第50-51页
        3.3.1 Radio Network Controller (RNC)第50-51页
        3.3.2 Base Station (NodeB)第51页
    3.4 User Equipment第51-53页
        3.4.1 Terminals第51-52页
        3.4.2 Universal Integrated Circuit Card(UICC)第52页
        3.4.3 UMTS Subscriber Identity Module (USIM)第52-53页
    3.5 UMTS Security Architecture第53-56页
        3.5.1 Authentication第53-54页
        3.5.2 Confidentiality第54页
        3.5.3 Integrity第54-56页
CHAPTER FOUR Some of Protocols Used for Authenticatins第56-76页
    4.1 Authentication Protocols第56-66页
        4.1.1 Point-to-Point Protocol (PPP)第56-57页
        4.1.2 Extensible Authentication Protocol (EAP)第57-61页
            4.1.2.1 EAP Packet Format第57-59页
            4.1.2.2 EAP Protocol Overview第59-60页
            4.1.2.3 EAP Pass-through第60-61页
        4.1.3 EAP-TLS第61-64页
        4.1.4 IEEE 802.1x第64-65页
        4.1.5 Remote Authentication Dial-In User Service (RADIUS)第65-66页
            4.1.5.1 RADIUS Messages第65-66页
    4.2 Roaming and Authentication第66-73页
        4.2.1 Authentication and Key Agreement Protocols第66-69页
            4.2.1.1 Involvement of Home Network第67页
            4.2.1.2 Key Derivation第67页
            4.2.1.3 Symmetric Key Based第67页
            4.2.1.4 Public Key Certificate Based第67-69页
        4.2.2 Inter-Domain Authentication第69-71页
        4.2.3 Handovers and Authentication第71-72页
        4.2.4 Handover Types第72-73页
    4.3 Media-Independent Pre-Authentication第73页
    4.4 Shadow Registration第73-74页
    4.5 Optimistic Access第74-76页
CHAPTER FIVE: Heterogeneous Network第76-91页
    5.1 Introduction of heterogeneous network第76-77页
    5.2 Overview of vertical mobility第77-80页
        5.2.1 Background: A short history of Vertical Mobility第77-78页
        5.2.2 Interworking Heterogeneous Networks第78-80页
    5.3 System Architecture and Design Issues第80-84页
        5.3.1 Features of B3G Systems第80-81页
        5.3.2 Technical aspects of vertical mobility第81-83页
        5.3.3 Integration models第83-84页
    5.4 Mobility management in heterogeneous networks第84-91页
        5.4.1 Macro and Microbility第84-86页
        5.4.2 Handoff Strategies第86-88页
        5.4.3 Vertical Handoff Characteristics第88-91页
CHAPTER SIX: Proposed Protocols第91-100页
    6.1 Proof-Token Based Approach第91-100页
        6.1.1 Protocol Operation第92-97页
        6.1.2 Protocol Analysis and Comparison第97-100页
CONCLUSION & FUTURE WORK第100-102页
ACKNOWLEDGEMENTS第102-103页
Reference第103-105页

论文共105页,点击 下载论文
上一篇:论侵犯商业秘密犯罪的危害结果及损失计算
下一篇:数字水印在文档图像中的应用研究