透過您的圖書館登入
IP:3.145.208.57
  • 期刊

Research on Private and Seamless Roaming Cloud Service Authentications

摘要


With the rapid development of information technology and the popularization of mobile communication devices, we can connect to the Internet through various media, such as general broadband networks, WiFi, and 5G. However, each medium has its own authentication system and protocol, so it is difficult for users to achieve seamless migration when roaming. When users roam in such a network environment to provide seamless transmission services, they must first face data and network technology integration. IETF stipulates that mobile IP and various heterogeneous networks use IP to solve this problem; however, in the current network environment, each network medium has its own authentication mechanism, thereby forming users with multiple sets of accounts and passwords. Therefore, when the user roams to other networks, let the authentication center confirm its identity. At the same time, the user can protect his access to the service when accessing the service. Privacy is the focus of research; in path exploration, the process of information transmission can easily be eavesdropped on and intercepted. Therefore, how to realize the security of information transmission is also a major issue. Moreover, mobile devices are limited by power and computing capabilities. The high computational security mechanisms used in data transmission or access services are inappropriate. Therefore, this research will use the mobile IP protocol to assist users in roaming in different network management system mechanisms and add an AAA server for authorization, authentication, accounting, and key management. It is used in conjunction with the identity-based identity code password system. It is a security mechanism suitable for roaming and identity verification in a network environment.

延伸閱讀