首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Security protocols in wired and wireless networks make use of computationally intensive cryptographic primitives and several message exchanges for authenticated key exchange at the session level and data confidentiality and integrity at the packet level. Moreover, changes in connectivity require mobile stations to repeatedly authenticate themselves, thereby expending more energy. In this paper, we propose an energy efficient security protocol for wireless local area networks (WLANs) that employs (a) different cryptographic primitives based on their suitability in terms of energy consumption and security level, (b) different levels of security and types of security services depending on the type of packet in 802.11 WLANs, and (c) a light-weight hashed key chain to reduce the number of expensive authentication transactions due to connectivity losses. We use packet traces from three different networks to compare the performance of the energy efficient security protocol with that of the standard 802.11 WLAN security protocol and show significant reduction in energy consumption.  相似文献   

2.
IEEE 802.11无线局域网OPNET建模与性能测试   总被引:13,自引:0,他引:13  
陈敏  韦岗 《计算机工程》2004,30(21):14-16,139
讨论了IEEE802.11无线局域网的建模和性能问题。基于对IEEE802.11协议和目前功能最强大的网络仿真工具OPNET软件的研究。首先分析了无线局域网的各种行为,分别对这些行为单独建模后,通过有线状态机将它们集成而形成IEEE802.11协议支持模块。给出了模型输入输出接口的详细说明。并对网络的性能进行了分析比较。  相似文献   

3.
IEEE 802.11无线局域网标准研究*   总被引:10,自引:0,他引:10  
介绍了IEEE 802.11全系列标准,研究了IEEE 802.11系列各标准的发展轨迹和相互关系,建立了该系列标准的层次模型。研究并分析了IEEE 802.11、IEEE 802.11a、IEEE 802.11b、IEEE 802.11g和IEEE 802.11n这几种常见标准,并对相应物理层和媒质访问控制层的关键技术作了重点分析。  相似文献   

4.
对IEEE 802.11 协议以及无线局域网存在的安全问题进行了深入的剖析,根据IEEE 802.11 的MAC头格式,提出了一种基于MAC 头序列号的阻断算法和一种基于Beacon 帧的AP 伪装算法。通过此二种方法,成功实现了对非法接入主机的阻断和对AP 信息的伪装。  相似文献   

5.
To support mobility, mobile devices are powered by batteries with limited energy. Thus, the good design of energy efficiency becomes one of the most important issues in wireless networks. A well-designed energy-efficient MAC protocols can be realized with both minimum energy consumption as well as maximum data throughput and can be easily implemented in products with de facto standards. Based on IEEE 802.11 infrastructure WLANs, we propose an energy-efficient MAC protocol which employs a novel approach to schedule those to-be-transmitted frames for saving energy by reducing the total waiting time and the collisions of the frames. Fault tolerance issues are also considered in the proposed protocol because frames are transmitted in fading interference wireless environment. Through analyses and simulations, we demonstrate that our protocol presents a better performance than IEEE 802.11 and other protocols not only in energy efficiency but also in aggregate throughput and frame transmission delay.  相似文献   

6.
In this paper, we propose a new efficient MAC protocol, named quality-of-service MAC (QMAC), which is an integrated solution for providing QoS guarantees to real-time multimedia applications in infrastructure WLANs. In addition, QMAC has the following attractive features: (i) its reservation scheme ensures that real-time stations enter the polling list in bounded time, (ii) it supports multiple priority levels and guarantees that high-priority stations always join the polling list earlier than low-priority stations, (iii) it employs the distributed pre-check technique such that the access point can admit as many newly flows as possible, while not violating admitted flows' guarantees, (iv) its dynamic bandwidth allocation scheme provides real-time traffic transmission with per-flow probabilistic bandwidth assurances, and (v) it uses a multipoll frame to poll all stations on the polling list at a time, therefore, the bandwidth can be utilized more efficient. Through simulations, we demonstrate the advantage of our QMAC.  相似文献   

7.
IEEE802.11 无线局域网技术及安全性研究   总被引:8,自引:0,他引:8  
随着信息技术的飞速发展和网络文化的普及,无线网络安全日益引起人们的广泛关注。为解决其安全性问题,首先详细分析了无线局域网的最新安全标准802.11x及其体系结构,并分析了这些技术的特点和存在的安全漏洞,最后给出了解决方法。  相似文献   

8.
梁宝龙  李文阁  陈阳 《微机发展》2010,(12):170-172,204
随着无线局域网(WLAN)技术的迅速发展,其安全问题日益受到人们的关注。由于传输的特殊性,WLAN始终面临严峻的安全考验。无线网络攻击技术的不断翻新,基于IEE802.11b的攻击技术会越来越多,复杂性将越来越高。所以与有线网路相比,保护WLAN安全的难度要远大于保护有线网络。文中介绍了基于IEEE802.11b协议下的WLAN可能面临的非法登录、拒接服务、字典攻击等安全威胁,分析了如何提高WLAN下的几种安全机制及802.11协议下的802.11i安全标准。提出了现有无线设备使用中一些可提高WLAN安全性的解决措施,在一定程度上提高了WLAN的安全性。  相似文献   

9.
于卫波 《计算机工程》2007,33(23):31-34
在分析了IEEE 802.11协议的基础上,提出了一种应用于低速率无线局域网环境下的信道接入方法,对其性能进行了分析,通过对仿真结果的比较,得到了该协议在窄信道环境下性能要优于IEEE 802.11的结论,同时验证了理论分析的正确性。  相似文献   

10.
The use of IEEE 802.15.4 standard based application systems has been rapidly increasing, for example, in medical services, sensor networks, public safety systems, and home automation systems. However, issues arise from the fact that IEEE 802.15.4 standard based low rate wireless personal area networks (LR-WPANs) use the same frequency bands as wireless local area networks (WLANs), and they interfere with each other. Based on past research on this issue, the interference has a more serious impact on LR-WPANs' performance than on WLANs' performance. In this paper we propose a method to improve LR-WPANs' performance while coexisting with WLANs, which is called the reliable beacon transmission based medium access control (MAC) protocol. Since the reliability of a beacon frame is important, in this method, only the beacon frame is transmitted in interference-free channels, and the data packets are transmitted in interfered channels instead of abandoning the channels altogether. This method increases the reliability of beacon frames as well as overall channel utilizations. The effectiveness of the proposed method was evaluated through extensive simulations, and this paper proves that this method improves the performance of IEEE 802.15.4 based wireless sensor networks (WSNs) over WLANs' interferences.  相似文献   

11.
分布式协调功能(DCF)采用有冲突避免的载波侦听多路访问(CSMA/CA,Carrier Sense Multiple Access with Collision Avoidance)方式访问共享无线媒体,是IEEE802.11媒体访问控制协议的基础。然而,在活动节点数目较大的环境下,这种机制容易造成性能恶化,且难以提供实时业务的服务质量(QoS)保证。概述了IEEE802.11的DCF机制及其性能分析方法,重点剖析了当前基于DCF的各种QoS机制,讨论了它们各自的优缺点,最后得出了优化DCF的一些有益的结论。  相似文献   

12.
对无线局域网的两种标准IEEE 802.11b和IEEE 802.11g的差异进行了研究,后者在前者的基础上采用了正交频分复用(OFDM)技术,通过设计一个针对这两种标准的无线局域网上的VoIP性能测试的试验,使用Chariot网络工具进行仿真,对延迟、抖动、丢包率进行对比分析,结果表明IEEE 802.11g标准比IEEE 802.11b标准具有明显的性能优势.  相似文献   

13.
徐晓锋  张闽  钱晨喜  陈清华 《计算机工程》2021,47(1):182-187,195
无线局域网(WLAN)中设备数量的指数级增长,导致激烈的信道争用及严重的同频干扰。当运行在同一频段上的两个WLAN在彼此感知范围内时,使用先监听后发送的分布式信道接入方式会引起资源浪费,降低网络吞吐率。提出一种密集WLAN场景下的干扰协调策略。根据IEEE 802.11ax中的基本服务集颜色对站点进行分组,提出协调交替目标唤醒时间策略(CAT),安排不同组内站点在不同的时间接收数据,从而避免信道争用,最小化干扰,同时通过优化下行数据包大小提高网络吞吐率。仿真结果表明,当两个WLAN距离很近时,CAT方案能够保证网络吞吐率。此外,在考虑误码率的情况下,吞吐率并非随着数据包的增大单调递增,而是存在一个阈值,超过该阈值后网络吞吐率即呈下降趋势。  相似文献   

14.
芦伟  曾文华 《计算机工程》2007,33(23):270-272
介绍无线局域网的概念。在分析无线局域网的安全机制原理的基础上,提出无线局域网存在的安全问题,给出一种嵌入式安全系统的设计方案,该方案采用安全性更高的加密算法以及更完善的数据校验机制,对解决无线局域网中的安全问题具有一定的实用价值。  相似文献   

15.
Motivated by observations from real world wireless local area network (WLAN) deployments, we develop in this paper a novel analytical model to characterize the saturation throughput of an IEEE 802.11-based access point (AP) and stations under the influence of hidden terminals. Unlike existing models, our model can accommodate different numbers of hidden nodes without increasing the model complexity. Given any number of hidden nodes, only four constraints are needed to describe the interaction between stations and the AP with the consideration of both uplink and downlink traffic. Simulation evaluation shows that our model predicts network performance accurately over a wide range of network sizes and indicates the existence of a throughput starvation problem. To address this problem, based on our model, we formulate a bandwidth allocation problem to optimize the network throughput and fairness under some predefined requirements by systematically tuning the AP and stations contention windows. Simulation results show that the starvation problem is resolved with our approach, and the target throughput is met.  相似文献   

16.
无线信道固有的特点,使得无线局域网面临比有线局域网更多的困难。发展合适的介质访问控制协议(MAC)是无线局域网一个关键,而其中退避算法又是MAC协议考虑的重点。本文介绍了退避机制在IEEE802.11MAC层中的作用.指出了二进制指数退避算法存在的不足。对当前已提出的多种典型退避算法进行了介绍,对各类算法的设计思想进行了分类。最后阐明了退避算法研究的发展趋势。  相似文献   

17.
基于DSSS系统的无线局域网MAC层协议的设计与实现   总被引:1,自引:0,他引:1  
介绍了基于DSSS传输系统的YH-WLAN无线局域网的AMC层协议的设计。在无线收发器的设计和采用帧格式的基础上,详细论述了该协议的发送和接收控制过程。并简单说明了该协议的实现方法。  相似文献   

18.
无线自组织网络中的IEEE802.11 MAC协议的研究   总被引:1,自引:0,他引:1  
IEEES02.11 DCF作为无线局域网的MAC层规范被广泛应用于无线自组织网络的仿真和测试中。通过研究发现即使在拓扑不变的条件下,使用表驱动路由协议DSDV,TCP流仍然存在不稳定和不公平现象,本文分析了问题产生的原因,提出了基于网络负载的解决问题方法。  相似文献   

19.
对IEEE802.11i协议中四次握手过程的临时会话密钥的协商和建立过程中的安全性进行了分析,发现在四次握手过程中存在安全隐患,并因此可能受到DoS(拒绝服务)攻击。在此基础上提出了一种改进方法,使四次握手过程的安全性得到进一步增强。  相似文献   

20.
本文介绍了IEEE802.11MAC协议中最基本的功能——DCF(分布式协调功能)的访问机制。在对DCF研究的基础上对MAC层的平均延迟性能进行了重点的研究和分析。通过基于OPNET的仿真实验,本文还探讨了介质访问延迟与网络各节点参数间的关系。此外,还对网络实时性进行了评估,从而为WLAN的设计和使用提供技术上的支持。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号