Research and Design of Dynamic Migration Access Control Technology Based on Heterogeneous Network

With the continuous development of wireless networks, the amount of privacy services in heterogeneous mobile networks is increasing, such as information storage, user access, and so on. Access control security issues for heterogeneous mobile radio network, this paper proposes a dynamic migration access control technology based on heterogeneous network. Through the system architecture of the mutual trust system, we can understand the real-time mobile node failure or abnormal state. To make the service can be terminated for the node. And adopt the 802.1X authentication way to improve the security of the system. Finally, it by combining the actual running test data, the trust update algorithm of the system is optimized to reduce the actual security threats in the environment. Experiments show that the system’s anti-attack, the success rate of access, bit error rate is in line with the expected results. This system can effectively reduce the system authentication information is illegally obtained after the network security protection mechanism failure and reduce the risk of user data leakage.

[1]  Weihua Zhuang,et al.  Preventing Unauthorized Messages and Achieving End-to-End Security in Delay Tolerant Heterogeneous Wireless Networks , 2010, J. Commun..

[2]  Weili Wu,et al.  Maximizing rumor containment in social networks with constrained time , 2014, Social Network Analysis and Mining.

[3]  Xiehua Yu Security Key Management Scheme in Heterogeneous Wireless Sensor Networks Based on Clustering Strategy , 2013, J. Networks.

[4]  Sang-Ha Kim,et al.  Robust mutual trust architecture for safety critical service in heterogeneous mobile network environment , 2015, Telecommun. Syst..

[5]  Anish Prasad Shrestha,et al.  Kerberos based authentication for inter-domain roaming in wireless heterogeneous network , 2010, Comput. Math. Appl..

[6]  Andrei V. Gurtov,et al.  An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications , 2014, Sensors.

[7]  Mimoza Durresi,et al.  Secure authentication in heterogeneous wireless networks , 2008, Mob. Inf. Syst..

[8]  Liu Guang-qiang Identity-based anonymity authentication protocol in the heterogeneous wireless network , 2011 .

[9]  Jiannong Cao,et al.  Trust-Based Fast Inter-Domain Secure Handoff over Heterogeneous Wireless Networks , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.

[10]  Bakkiam David Deebak Secure and Efficient Mutual Adaptive User Authentication Scheme for Heterogeneous Wireless Sensor Networks Using Multimedia Client–Server Systems , 2016, Wirel. Pers. Commun..

[11]  Lei Li,et al.  Energy-efficient resource allocation in heterogeneous network with cross-tier interference constraint , 2013, 2013 IEEE 24th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops).

[12]  Mir-Kamran Mahshid,et al.  An efficient and secure authentication for inter-roaming in wireless heterogeneous network , 2014, Social Network Analysis and Mining.

[13]  Lina Zhu,et al.  A random key management scheme for heterogeneous wireless sensor network , 2015, 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC).

[14]  Marko Hölbl,et al.  A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.