用户名: 密码: 验证码:
电子商务与宽带城域网的关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着全球电子商务的飞速发展,对网络安全和网络技术的研究提出了更高的要求,本论文重点研究了电子商务的安全技术和宽带城域网的关键技术。
     首先,在对电子商务安全机制和安全交易协议分析的基础上,提出了利用组合加解密方案对安全电子交易SET协议进行改进,通过引入多证书、多数字签名和算法协商过程,克服了SET协议对加解密算法的限制,提高了SET协议的适应性和安全性。
     其次,通过对数字现金的模型和应用进行分类研究,提出了利用概率验证方法对基于Brands算法的数字现金模型进行改进,通过对用户信用度和通讯繁忙程度的综合考虑提高了数字现金的安全性。
     网络安全研究方面,在分析传统防火墙功能的基础上提出了一种新型智能防御防火墙的结构。在对IP Sec VPN和MPLS VPN对比分析的基础上,提出了一种集成VPN架构。通过分析MPLS技术的优势、现存问题和MPLS支持区分服务的具体算法,从多方面说明了多协议标记交换MPLS技术在构建城域网中存在的问题。
     论文结合广州市重点建设工程项目——广州宽带城域网、广州宽带无线接入网和广州宽带IP城域网的设计和建设,在对现有的宽带有线技术——POS技术、DPT技术、GE技术和DWDM技术、宽带无线技术——LMDS技术、MMDS技术和扩频通讯技术分析的基础上,共同提出了利用密集波分复用DWDM技术建设宽带城域网的设计和利用本地多点业务分配LMDS技术建设宽带无线接入网的设计,通过项目的设计和建设,建成了国内第一个利用DWDM技术构建的宽带城域网和国内第一个LMDS宽带无线商用网。针对宽带城域网发展中存在的问题,提出了以“业务驱动型”思想进行IP城域网的建设并提出了利用VLAN技术实现宽带IP城域网的设计,系统可平滑升级到支持MPLS协议。
     论文最后结合广州市社区信息化建设示范项目——广州数字社区电子商务的建设,提出了社区电子商务建设的B-B-C模式,给出了系统分析和设计并进行了软硬件实施,系统已稳定运行半年,效果良好。
     本研究工作得到广东省自然科学基金项目(980597)的资助和广州市宽带主干网络有限公司的支持,特此感谢!
As the fast growing of the global E-commerce, the research of the network security and network technology is more challenging. In this paper, the critical technology of E-commerce's security and broadband MAN is studied extensively.
    First of all, on the basis of the analysis of the E-commerce security mechanism and security deal protocol, an improved SET protocol based on the combined cryptographic algorithms is proposed. Aimed to the limit of cryptographic algorithms in SET protocol, the methods of creation and authentication of combined algorithms digital certificate and digital signature are given to improve the adaptability and security.
    Secondly, the existing models and application of electronic cash are analyzed. And a novel Brand's of electronic cash scheme based on probabilistic verification is proposed. The security of electronic cash is improved by adding the integrated calculation of the credit of the user and the busyness of LOC.
    Thirdly, a novel intelligent firewall architecture is proposed on the basis of the classical schemes. And a novel integrated VPN architecture is proposed by comparing IPSec VPN with MPLS VPN. It is pointed out that there exist questions on applying MPLS to the building of the MAN by analyzing the advantages, existing problems and algorithms on diff-services of MPLS.
    Combining with the building of the Guangzhou important project—Guangzhou broadband MAN, Guangzhou broadband wireless access network and Guangzhou broadband IP MAN, the existing broadband technologies-POS, DPT, GE, DWDM and the wireless broadband technologies—LMDS, MMDS and expanding frequency communication technology are discussed. The scheme of utilizing the DWDM and LDMS to design MAN is proposed. And the project is the first DWDM broadband network and LMDS broadband wireless network in our country. In addition, aiming to the existing problems of the developing broadband MAN, a novel designing technology, which aimed to the client is proposed. The system is constructed by
引文
[1] Bruce Schneier. Applied Cryptography, Protocols, Algorithms, and Source Code in C. Second Edition. China Machine Press. 2000: 151-154
    [2] Visa and MasterCard. Secure Electronic Transaction. Bookl: Business Description, May 1997
    [3] Visa and MasterCard. Secure Electronic Transaction. Book2: Programmer's Guide, May 1997
    [4] Visa and MasterCard, Secure Electronic Transaction, Book3: Formal Protocol Definition, May 1997
    [5] 陈庆锋,王驹,白硕等.电子商务安全协议的逻辑验证.软件学报.2000,11(3):346-362
    [6] 白硕,隋立颖,陈庆锋.安全协议的逻辑验证.软件学报.2000,11(2):213-221
    [7] Hwang Jing-Jang, Hsueh Sue-Chen. Greater Protection for Credit Card Holders: A Revised SET protol. 1998, 19(1): 1-8
    [8] 史国庆,李普红,毛宗源.利用组合加解密方案改进SET协议的研究.计算机工程与应用.2002,38(2):43-45
    [9] 赵箐,胡运发,李丽燕.电子商务中网上购物的安全协议—SSL与SET.计算机工程,1999,25(12):90-91
    [10] 陈庆锋,白硕,王驹等.SET协议内容简介及NDL逻辑的应用.软件学报.2000,11(2):205-212
    [11] 田梦瑾,杨宇航,李建华.SET标准网络信息交互系统模型的改进方案.上海交通大学学报.1999,33(1):84-87
    [12] 黄诚,杨宇航,李建华.基于Internet电子商务的信息安全传输.上海交通大学学报.1999,33(1):108-110
    [13] 洪琳,李展.数字签名、数字信封和数字证书.计算机应用.2000,20(2):41-42
    [14] 刘胜利,王育民.无条件安全密钥协商中认证问题的研究.计算机学报.1999,22(11):1184-1188
    [15] 孙晓蓉,王育民.计算机分布环境下的认证与密钥分配研究.计算机学报.??1999,22(6):577-5
    [16] 蔡小虎,钱世德.信用卡在线安全支付的分析与构造.微型电脑应用.2000.16(1):48-50
    [17] 李普红.提高基于SET协议的电子商务系统的安全性与效率.华南理工大学硕士论文,1999:32-43
    [18] 陈福生.基于SET协议的电子购物系统的研究与实现.华南理工大学硕士论文,2001:27-38
    [19] 梁晋,王育民等.电子商务核心技术—电子交易协议的理论与设计.西安电子科技大学出版社,2000:438-446 431-433
    [20] Brands S. Untraceable Off-line Cash in Wallets with Observers. Advanced in Cryptology-Crypto'93, Santa Barbara, California: Springer Verlag, 1993: 302-318
    [21] Frankel M, Yung M. Secure and Efficient Off-line Digital Money. Proceeding of the Twentieth International Colloquium on Automata, Languages and Programming(ICALP 1993), Lund, Sweden: Springer Verlag, 1993: 265-276
    [22] Camenisch J, Maurer U, Stadler M. Digital Payment Systems with Passive Anonymity-Revoking Trustees. Esorics'96, Italy, Springer-Verlag, 1996: 33-44
    [23] Davida G, Frankel Y, Tsiounis Y, et al. Anonymity Control in E-Cash Systems. Financial Cryptography'97. Anguilla, British West Indies, Springer-Verlag, 1997: 1-16
    [24] Chaum D. Blind Signatures for Untraceable Payments. Advances in Cryptology, Pro of Crypo'82. Santa Barbara. California: Springer Verlag, 1983: 199-203
    [25] Chaum D, Fiat A. Untraceable Electronic Cash. Advances in Cryptology, Proc of Crypo'88, Santa Barbara, California: Springer Verlag, 1990: 319-327
    [26] Okamoto T, Ohta K. Disposable Zero Knowledge Authentication and Their Applications to Untraceable Electronic Cash. Advances in Cryptology, Procof Crypto 89, Santa Barbara, California: Springer Verlag, 1990: 481-497
    [27] Okamoto T, Ohta K. Universal Electronic Cash. Advances in Cryptology-Crypto-'91, Santa Barbara, California: Springer Verlag, 1992: 324-337[28] Camenisch J, Piveteau J M, Stadler M. An Efficient Fair Payment System. ACM-CCS, New Delhi, 1996: 88-94
    [29] Jarecki S, Odlyzko A, An Efficient Micropayment System Based on Probabilistic Polling. Financial Cryptography'97. Anguilla, British West Indies, Springer-Verlag, 1997: 173-192
    [30] Yacobi Y. On the Continuum between On-line and Off-line E-Cash Systems. Financial Cryptography'97. Anguilla, British West Indies, Springer-Verlag, 1997: 193-202
    [31] Chen Kai, Zhang Yuqing, Xiao Guozhen, et al. A Practical Efficient Anonymous Divisible E-Cash System. International Workshop on Cryptographic Techniques and E-Commerce, CrypTEC'99, HongKong, 1999: 272-278
    [32] Pfitzmann B, Waidner M. How to Break and Repair a "Provably Secure" Untraceable Payment System. Advances in Cryptology Proceedings of Crypo'91, Santa Barbara, California: Springer Verlag, 1992: 338-350
    [33] Chan A, Frankel Y, Tsiounis Y. Easy Come-Easy Go Divisible Cash. Advances in Cryptology-Proceedings of Eurocrypt'98, Espoo, Finland: Springer Verlag, 1998: 561-575
    [34] Tatsuaki, Kazuo. One-Time Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash. IEICE Fundamentals. 1998, 1: 2-10
    [35] Okamoto T. An Efficient Divisible Electronic Cash Scheme. Advances in Cryptology-Crypto'95, Santa Barabara, California: Springer Verlag, 1995: 438-451
    [36] Ferguson N. Single Term Off-Line Coins. Advances in Cryptology, Proc of Eurocrypt'93, Lofthus, Norway: Springer Verlag, 1993: 318-328
    [37] Tatsuaki, Kazuo. One-Time Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash. IEICE Trans. Fundamentals. 1998, E81-A(1): 2-10
    [38] Zhong Ming, Yang Yixian. Partial Blind Signature Based on Bit Commitment. Chinese Journal of Electronics. 2000, 7: 284-286[39] Von Solms B, Naccache D. On Blind Signatures and Perfect Crimes[J]. Computers and Security. 1992, 11(6): 581-583
    [40] Sander T, Ta-Shma. Anonymous Electronic Cash. Advances in Cryptology-Crypto'99, Santa Barbara, California: Springer-Verlag, 1999: 555-572
    [41] Chan A, Frankel Y, Machenzie P et al. Misrepresentation of Identities in E-cash Schemes and how to Prevent it. Advanced in Cryptography-Asiacrypt'96, New York: Springer-Verlag, 1996: 276-285
    [42] Patiwat. Money in Electronic Commerce: Digital Cash, Electronic Fund Transfer, and Ecash Panurach. Communications of the ACM 396. 1996: 45-50
    [43] Natl Westminster. Electronic Cash in a Global World Higgins, G. R. L. lEE Conference Publication 1997, 437: 537-539
    [44] Pfitzmann Birgit, Waidner Michael. Strong Loss Tolerance of Electronic Coin Systems. ACM Transactions on Computer Systems. 1997, 5(2): 194-213
    [45] 陈庆锋,白硕等.SET协议中问题的分析及解决方案.2000,23(2):202-209
    [46] 史国庆,祁明,卓光辉,毛宗源.数字现金的模型研究及应用.计算机工程与应用.2001,37(14):35-38
    [47] 史国庆,祁明,卓光辉,祁明,毛宗源.加入概率检验的Brands数字现金改进方案算法.计算机工程与应用.2001,37(24):22-24
    [48] 陈恺,魏仕民,肖国镇.电子现金系统的研究与发展.西安电子科技大学学报.2000,27(4):510-514
    [49] 陈恺,张玉清,肖国镇.基于概率验证的可分电子现金系统.计算机研究与发展.2000,37(3):752-758
    [50] 杨波,刘胜利,王育民.利用Smart卡的可撤销匿名性的电子支付系统.电子学报.1999,10:83-86
    [51] 杨波,刘胜利,王育民.一种可撤销匿名性的电子支付系统.西安电子科技大学学报.1999,26(4):420-422
    [52] Zhong Ming, Yang Yixian. Bit Commitment and its Application to Electronic Cash. Chinese Journal of Electronics. 2000, 9(2): 189~193
    [53] 祁明,肖国镇.口令认证方案的安全性改进及其相应的数字签名方案.通信学报.1998,19(6):61-64[54] 祁明,张凌 有向签名方案 电子学报 1998 26(4):124-125
    [55] 杨波,王育民.利用电子钱包的公正支付系统.计算机学报.1999,22(8):792-796
    [56] 祁明 张凌 ElGamal型签名算法分批验证及其安全性 计算机工程与设计1999 19(1):3-9
    [57] 祁明,韩亮 代理签名与阈下信道的封闭 计算机工程与应用 2000 36(12):25-27
    [58] 杨波,郑东,王育民.一种新的电子货币系统.西安电子科技大学学报.1998,25(5):616-620
    [59] 朱红儒,肖国镇,杨义先.基于ElGamal签名的电子现金体制.通信保密.2000,4:65-68
    [60] 卓光辉.一种新型电子现金的研究与实现.华南理工大学硕士论文.2001:18-23
    [61] Hunt Ray. Internet/Intranet firewall Security-Policy, Architecture and Transaction Services. Computer Communications. 1998, 21(13): 1107-1123
    [62] 吴昕,李之棠.并行防火墙研究.计算机工程与科学.2000,22(2):54-57
    [63] 王锋波,曾昭苏.一种基于多代理技术的分布式入侵检测系统.计算机工程与科学.2000,22(2):62-65
    [64] Lan Oliver. Meta-Firewall: A Sixth Generation Firewall—Part 1. Network Security. 1998, 1998(6): 10-16
    [65] Harris Brendon, Hunt Ray. Firewall Certification. Computers and Security. 1999, 18(2): 165-177
    [66] 韦卫,王得杰,王行刚.Internet网络层安全协议理论研究与实现.计算机学报.1999,22(2):171-176
    [67] 李信满,赵宏.具有信息分析功能的防火墙系统研究.2000,27(2):40-42
    [68] Khoussainov R, Patel A. LAN Security: Problems and Solutions for Ethernet Networks. Computer Standards and Interfaces. 2000, 22(3): 191-202
    [69] 刘克龙,蒙扬,卿斯汉.一种新型的防火墙系统.计算机学报.2000,23(3):231-236
    [70] Hancock Bill. Improving Network Security. Network Security. 1998, 1998(9):??12-13
    [71] Liren Zhang, Li zheng. Ipv6 Traffic with Multi-class QoS in VPN. Computer Networks. 2001, 37: 263-275
    [72] Markham Tom, Williams Chuck, Key Recovery Header for IPSEC, Computer and Security. 2000, 19(1): 86-90
    [73] 李之棠,杨红云.模糊入侵检测模型.计算机工程与科学.2000,22(2):49-53
    [74] 张磊,卿斯汉.一个基于Agent的防火墙系统的设计与实现.软件学报2000,11(5):642-645
    [75] Feldman, et al. Evolution of Multiprotocol Lable Switching. IEEE Communication Magazine, 1998, 36(5)
    [76] Szviatovszki B, Szentesi A, Juttner A. Minimizing Re-routing in MPLS Networks with Preemption-aware Constraint-based Routing. Computer Communications. 2002, 25: 1076-1084
    [77] Alfano Marco. Design and Implementation of a Cooperative Multimedia Environment with Qos Control. Computer Communications. 1998, 21(4): 350-361
    [78] 刘郁恒,张光昭.MPLS流量工程技术的研究.数据通讯.2000,2:1-4
    [79] Cheung. K. H, Misic. J. On virtual Private Networks Security Design Issues. Computer Networks. 2002, 38(2): 165-179
    [80] 李珂,顾尚杰,诸鸿文.MPLS的研究发展及其关键技术.数据通讯.2000,1:19-22
    [81] Hunt Ray. A Review of Quality of Service Mechanisms in IP-based Networks—Integrated and Differentiated services, Multi-layer Switching, MPLS and Traffic Engineering. Computer Communications. 2002, 25(1): 100-108
    [82] Ivan Pepelnjak,Jim Guichard.MPLS和VPN体系结构.人民邮电出版社,2001:291-313
    [83] Spath Jan. Dynamic Routing and Resource Allocation in WDM Transport Networks. Computer Networks. 2000, 32(5): 519-538
    [84] 潘见国,陈海强.基于VPN技术的网络应用.计算机应用研究.2001,18(1):??87-88
    [85] 吴江,赵慧岭.下一代的骨干网络技术—多协议标记交换.人民邮电出版社,2001:156-182
    [86] 孙海荣,李乐民.DQCA:一种新的城域网介质访问控制协议.电子学报.1994,22(4):76-79
    [87] Saha. D, Purkayastha. M. D, Mukherjee. A. An Aooroach to Wide Area WDM Opticol Network Design Using Genetic Algorithm. Computer Communications. 1999, 22(2): 156-172
    [88] 洪韵,帅建梅.支持区分服务的MPLS网络.计算机应用研究.2001,18(3):56-59
    [89] 赵强,胡大龙.城域网建设中语音和数据业务接入的思考.现代电信科技.2001.10:18-21
    [90] 沈建东.城域网建设中的一些问题.电信科学.1994,10(9):19-25
    [91] 徐荣,龚倩,叶培大.基于IP over DWDM的城域网技术研究.电信科学.2000,19(3):7-11
    [92] Schumacher H. J, Ghosh, Sumint. A Fundamental Framework for Network Security Towards Enabling Security on Demand in an ATM Network. Computers and Security. 1998, 17(6): 527-542
    [93] 冷晓冰,付立政,王中,栾贵兴.ATM网络中ABR流量控制研究进展.小型微型计算机系统.2000,21(6):561-564
    [94] Van Do. Tien, et al, Topology Optimization of An Averlay ATM Network in an SDH Infrastructure. Computer Networks. 2000, 34(1): 199-210
    [95] Wang Wen-Fong, Hwang Wen-Shyang, Wang Jun-Yao. Design of a Large Gbits/s MAN Using a Cycles Reservation-based MAC Protocol. Journal of Systems Architecture. 2000, 46(12): 1115-1135
    [96] Wang Wen-Fong, Wang Jun-Yao, Hwang Wen-Shyang. On the resource reservation approach to design a large-scale and ultra high-speed MAN. Computers and Electrical Engineering. 2001, 27(2): 173-199
    [97] 修文群,赵宏建.宽带城域网建设与管理.科学出版社,2001:358-374
    [98] 钱宗钰等.光接入网技术及其应用.人民邮电出版社,2001:61-70[99] Hikmet Sari. Broadband Radio Access to Homes and Businesses: MMDS and LMDS. Computer Networks 1999, 31(4): 379-393
    [100] 张正文,陈卓.采用扩展频谱通讯技术组建城域网.计算机应用.2000,2(10):53-55
    [101] Ayanoglu. Ender. Wireless Broadband and ATM Systems. 1999, 31(4): 395-409
    [102] 奚宁.宽带无线接入网-LMDS.电信科学.2000,16(6):52-53
    [103] 梁剑豪.中国联通LMDS宽带无线接入实验.电信科学.2000,16(6):53-55
    [104] 王骊波.宽带无线城域网的设计.西安邮电学院学报.2000,5(3):26-29
    [105] 刘玉华,侯淑珍.实现宽带无线接入的LMDS系统.黑龙江通讯技术.2000,1:21-23
    [106] 祁明,史国庆.强盲参数签名的研究与应用 计算机应用研究 2001,18(3):34-38
    [107] 谢锐,周子豪.高校宽带城域网建设中的几种关键技术.小型计算机系统.2001,22(Sup):187-188
    [108] Zhong Ming, Feng Yunbo, Yang Yixian. Single-term Divisible Electronic Cash Based on Bit Commitment. IEEE Symposium on Computers and Communications. 2000, 7: 280~285
    [109] 祁明,史国庆.多重盲签名方案及其应用.计算机工程与应用.2001,37(3):91-92
    [110] Fan ChunI, Lei ChinLaung. Low-computation Partially Blind Signatures for Electronic Cash. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 1998, E81-A(5): 818-824
    [111] Ezawa Kazuo, Napiorkowski Gregory, Kossarski Mariusz. Evaluation of Electronic Cash Threat Scenarios Using Micro Dynamic Simulation. Winter Simulation Conference Proceedings 1998: 1641-1648
    [112] 祁明,晏维龙,瞿裕忠,张成洪,蔡小虎.电子商务实用教程.第一版.高等教育出版社,2000:211-221
    [113] 刘尊全.刘氏高强度加密算法设计原理与装置.清华大学出版社,1996:91-96
    [114] Chaum David, Brands Stefan. Minting Electronic Cash. IEEE Spectrum 1997,??34(2): 30-34
    [115] schneier B, Kelsey J, Whiting D. Performance comparison of the AES submissions. The Second AES Conference, 1999: 15-34
    [116] Tygar, J. D. Atomicity in Electronic Commerce. Proceedings of the Annual ACM Symposium on Principles of Distributed Computing. 1996: 8-26
    [117] Gemmell, Peter S. Traceable E-cash. IEEE Spectrum. Feb 1997: 35-37
    [118] W. S. Juang, C. L. Lei. Partially Blind Threshold Signatures Based on Discrete Logarithm. Computer Communication. 1999, 22: 73-86
    [119] Birgit Pfitzmann, Michael Waidner. Strong Loss Tolerance of Electronic Coin Systems. ACM Transactions on Computer Systems. 1997, 15: 194-213
    [120] Shingo, Kouichi. A Practical Off-Line Digital Money System with Partially Blind Signatures Based on the Discrete Logarithm Problem. IEICE Trans. Fundamentals. 2000, 1: 106-108
    [121] 卢开澄.计算机密码学.清华大学出版社,1990:130-135
    [122] Kumar Akhil, Leon Zhao J. Workflow Support for Electronic Commerce Applications. Decision Support Systems. 2002, 32(3): 265-278
    [123] Chatterjee S, Thachenkary C. S, Katz J. L. Modeling the Economic Impacts of Broadband Residential Services. Computer Network and ISDN System. 1998, 30(14): 1295-1310
    [124] Gray P. Schneider, James T. P. Electronic Commerce. China Machine Press. 2000: 159-181
    [125] 杨千里,王育民.电子商务技术与应用.电子工业出版社,1999:164-171
    [126] 王育民,刘建为.通信网的安全——理论与技术.西安电子科技大学,1999:389-419
    [127] 赖溪松,韩亮,张真诚.计算机密码学及其应用.国防工业出版社,2001:131-138
    [128] 刘红铄,李晓.Intranet/Extranet的安全技术研究.计算机应用研究,2001,18(3):54-55
    [129] 周子豪,汪为农,瞿庆海.电子商务系统架构研究.小型计算机系统.2001,22(sup):206-208

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700