Mobility-Aware Security Management in QoS supported Heterogeneous Networks

碩士 === 國立中正大學 === 電機工程所 === 95 === In recent years, as the developments of wireless network technology are growing abundantly and its devices are becoming more widely used, users can access network resources seamlessly, anywhere and anytime. However to manage these wireless network resources effecti...

Full description

Bibliographic Details
Main Authors: Jui-Hung Cheng, 鄭瑞鴻
Other Authors: Kim-Joan Chen
Format: Others
Language:zh-TW
Published: 2007
Online Access:http://ndltd.ncl.edu.tw/handle/81848801698386300176
Description
Summary:碩士 === 國立中正大學 === 電機工程所 === 95 === In recent years, as the developments of wireless network technology are growing abundantly and its devices are becoming more widely used, users can access network resources seamlessly, anywhere and anytime. However to manage these wireless network resources effectively, many mobile management standards have been proposed. Although the security equipment of Application-Aware controls and monitors the payload of packets, but nowadays network security equipment lack the ability for mobility. This can’t satisfy the need for mobile heterogeneous network safety, and will cause many security faults in the network. It is found in many research results worldwide that many of them are mainly based on encryption, decryption, and key management. Very few are concerned with the difficulty of placing firewalls and IDS in the network. In an all IP heterogeneous network environment, the firewall and IDS play a crucial role and our research point lies in adding new functionalities and filling in the lack of firewall and IDS abilities in IP heterogeneous network technology. We integrate the network forensic in our research and bring new network technologies of the future a more secure environment. In this paper, we propose a solution to the problem described above. Our architecture contains a mobile-aware firewall and IDS that will change its settings according to the current moving status of the user. Safety goals will be met using these techniques for the user in a ubiquitous coverage.