首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
应用于IEEE802.1x的可扩展认证协议的安全分析   总被引:8,自引:0,他引:8  
杨磊  高海锋  张根度 《计算机工程》2004,30(10):127-128,189
IEEE802.1x协议是对现行lEEE802.11协议的安全补充,lEEE委员会为IEEE802.11推出了一个安全架构,称之为RSN(Robust Security Network)。RSN利用IEEE802.lx标准来实现访问控制、认证以及密钥的管理。可扩展认证协议(EAP)是IEEE802.1x中引入的一个重要协议,该标准为基于802标准的局域网提供了一个认证的框架。文章对EAP在应用中所遇到的问题和安全隐患进行分析,并对这些问题提出了可能的解决方案。  相似文献   

2.
吴名欢  程小辉 《计算机科学》2014,41(1):225-229,270
在分析了物联网通信节点使用的David数字图书馆通信协议运行的基础上,指出了此协议存在阅读器非法扫描标签和协议主体没有会话密钥的安全隐患,提出了解决安全隐患的方案。采用通信顺序进程(CSP)的形式化分析方法对提出的方案进行了建模分析,对复杂环境下的攻击者和各协议主体建立了CSP进程。在实验中,攻击者在Dolev_Yao模型下对新的协议方案模型进行攻击,最后没有发现攻击点。实验结果表明,该协议方案能有效解决David数字图书馆协议的安全隐患,保证了协议主体的相互认证性以及会话密钥的安全性,证明了模型的可行性。  相似文献   

3.
对Canetti—Krawczyk模型进行深入研究,抽象并形式化IEEE802.11i协议的四步握手协议。依据Canetti—Krawczyk模型中在AM下的安全性定义,利用其理论进行形式化分析,得出四步握手协议在AM下的SK安全的结论。提出对于UC下的安全性和协议可用性将是下一步研究目标。  相似文献   

4.
IEEE 802.11无线局域网OPNET建模与性能测试   总被引:13,自引:0,他引:13  
陈敏  韦岗 《计算机工程》2004,30(21):14-16,139
讨论了IEEE802.11无线局域网的建模和性能问题。基于对IEEE802.11协议和目前功能最强大的网络仿真工具OPNET软件的研究。首先分析了无线局域网的各种行为,分别对这些行为单独建模后,通过有线状态机将它们集成而形成IEEE802.11协议支持模块。给出了模型输入输出接口的详细说明。并对网络的性能进行了分析比较。  相似文献   

5.
无线网络因其连接方便又灵活已经非常普及了,但是无线网络的安全性一直是一个突出问题。IEEE和Wi—Fi先后出台了相应的标准和协议来保证无线网络的安全性,包括国际上通用的IEEE802.11标准,WPA,IEEE802.11i(WPA2),并用密码技术在其演化过程中做了很多改进,提高了WLAN的安全性。  相似文献   

6.
基于IEEE 802.11认证协议的DoS攻击   总被引:4,自引:0,他引:4  
对IEEE802. 11认证协议的漏洞和无线网络受到的拒绝服务 (DoS)攻击进行了深入的剖析。捕获并分析IEEE802. 11MAC帧,利用序列号分析的方法,对授权的合法客户受到的DoS攻击进行检测;利用统计分析方法,对访问接入点AP受到的DoS攻击进行检测。  相似文献   

7.
在无线局域网(WLAN)中EAP-TLS认证的应用   总被引:1,自引:0,他引:1  
随着无线局域网应用范围的扩大,无线局域网(WLAN)正从传统意义上的局域网逐步演变为“公共无线局域网”。从而加快了人们对无线局域网的消费需求。但众所周知是,基于802.11标准的WLAN安全技术存在严重的安全隐患.它的安全性依赖于静态密钥进行接入控制和加密。为了解决这个问题,IEEE随后又推出了802.1X标准,IEEE802.1X称为基于端口的访问控制协议(Port based network access control protocol),它对认证方式和认证体系结构进行了优化。  相似文献   

8.
IEEE 802.15.4标准因其低速率、低成本、低功耗、高质量,被认为是无线传感器网络和无线个人域网络的理想实现技术。简要介绍了无线传感器网络及其主要特点和问题,及无线传感器网络的安全需求。提出了增强安全性的IEEE802.15.4协议SE-IEEE802.15.4研究,其中使用公钥加密算法ECC来实现IEEE802.15.4协议的数字签名。最后采用NS-2平台对其进行仿真,并进行了性能和安全性的分析。  相似文献   

9.
操漫成 《计算机工程》2009,35(10):126-128
通过对串空间模型的扩展,使其具备分析复杂安全协议的能力。利用扩展后的串空间模型,对IEEE802.11i协议中的4步握手协议进行分析,证明4步握手协议达到协议机密性和认证正确性目标的结论。指出在协议可用性分析方面还须继续对分析方法进行扩展研究。  相似文献   

10.
IEEE 802.11e基于竞争的信道访问机制性能分析   总被引:4,自引:0,他引:4  
王澄  龚玲  杨宇航 《计算机工程》2006,32(6):124-126
在回顾了IEEE802.11MAC协议的基础上,讨论并分析了即将定稿的IEEE802.11e的基于竞争的信道访问工作机制下MAC协议对QoS的支持。  相似文献   

11.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

12.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

13.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

14.
Kim  K. H. 《Real-Time Systems》2004,26(1):9-28
Distributed real-time simulation is a young technology field but its practice is under increasing demands. In recent years the author and his collaborators have been establishing a new approach called the distributed time-triggered simulation (DTS) scheme which is conceptually simple and easy to use but widely applicable. The concept was initiated in the course of developing a new-generation object-oriented real-time programming scheme called the time-triggered message-triggered object (TMO) programming scheme. Some fundamental issues inherent in distributed real-time simulation that were learned during recent experimental studies are discussed along with some approaches for resolving the issues. An execution engine developed to support both the TMOs engaged in control computation and the TMOs engaged in DTS is also discussed along with its possible extensions that will enable significantly larger-scale DTSs.  相似文献   

15.
Zusammenfassung Mit zunehmender Größe der Softwaresysteme verschärfen sich die für die Software-Herstellung typischen Probleme: Beherrschen großer Objektmengen, Erhalten der Systemkonsistenz, Kontrolle der ständigen Änderungseinflüsse und Gewährleisten einer langen Lebensdauer. Die Disziplin Konfigurationsmanagement bildet den methodischen Ansatz, diese Probleme besser zu beherrschen. Software-Konfigurationsmanagement faßt die Herstellung von Softwaresystemen als eine Abfolge von kontrollierten Änderungen an gesicherten Zwischen- und Endergebnissen auf. Dargestellt werden die Objekte und Funktionen des Software-Konfigurationsmanagements sowie die hierfür in großen Software-Projekten benötigten Methoden, Instanzen und Hilfsmittel.  相似文献   

16.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and  相似文献   

17.
正Brain-machine interfaces(BMIs)aim at building a direct communication pathway between the brain and an external device,and represent an area of research where significant progress has been made during the past decade.Based on BMIs,mind information can be read out by neural signals to control  相似文献   

18.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

19.
20.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号