首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Secure cellular data services have become more popular in the Japanese market. These services are based on 2G/3G cellular networks and are expected to move into the next-generation wireless networks, called Beyond 3G. In the Beyond 3G, wireless communication available at a user's location is selected based on the type of the service. The user downloads an application from one wireless network and executes it on another. Beyond 3G expects core and wireless operators and allows to plug-in new wireless access. A security model that can accommodate these requirements needs to be sufficiently flexible for end users to utilize with ease. In this paper, we explain the Mobile Ethernet architecture for all IP networks in terms of the Beyond 3G. We discuss usage scenario/operator models and identify entities for the security model. We separate a mobile device into a personal identity card (PIC) containing cryptographic information and a wireless communications device that offers security and flexibility. We propose a self-delegation protocol for device authentication and use a delegated credential for unified network- and service-level authentication. We also propose proactive handover authentication using the security context between different types of wireless access, such as Third Generation Partnership Project (3GPP) and WLAN, so that the secure end-to-end communication channels established by service software on the TCP/IP are not terminated. Lastly, we raise security issues regarding the next-generation platform.  相似文献   

2.
S.A.  S.M.  N.L.  P.J.   《Ad hoc Networks》2008,6(7):1151-1167
Nowadays, a commonly used wireless network (i.e., Wi-Fi) operates with the aid of a fixed infrastructure (i.e., an access point) to facilitate communication between nodes. The need for such a fixed supporting infrastructure limits the adaptability and usability of the wireless network, especially in situations where the deployment of such an infrastructure is impractical. Recent advancements in computer network introduced a new wireless network, known as a mobile ad hoc network (MANET), to overcome the limitations. Often referred as a peer to peer network, the network does not have any fixed topology, and through its multi hop routing facility, each node can function as a router, thus communication between nodes becomes available without the need of a supporting fixed router or an access point. However, these useful facilities come with big challenges, particularly with respect to providing security. A comprehensive analysis of attacks and existing security measures suggested that MANET are not immune to a colluding blackmail because such a network comprises autonomous and anonymous nodes. This paper addresses MANET security issues by proposing a novel intrusion detection system based upon a friendship concept, which could be used to complement existing prevention mechanisms that have been proposed to secure MANETs. Results obtained from the experiments proved that the proposed concepts are capable of minimising the problem currently faced in MANET intrusion detection system (IDS). Through a friendship mechanism, the problems of false accusations and false alarms caused by blackmail attackers in intrusion detection and response mechanisms can be eliminated.  相似文献   

3.
As an extension of wireless ad hoc and sensor networks, wireless mesh networks recently were developed as a key solution to provide high-quality multimedia services and applications, such as voice, data, and video, over wireless personal area networks, wireless local area networks, and wireless metropolitan area networks. A WMN has a hybrid network infrastructure with a backbone and an access network and usually is operated in both ad hoc and infrastructure modes with self-configuration and self-organization capabilities. In this article, we review security challenges, attacks, and countermeasures in the physical, medium access control (MAC), and network layers of wireless mesh backbone and access networks. We then extend the concept of traffic flow from IP networks and define meshflow in wireless mesh networks. Based on this new concept, we propose a comprehensive framework to realize network monitoring, user and router profiling, application and service balancing, and security protection in wireless mesh backbone networks. Practical issues and design trade-offs for implementing the proposed framework in real systems also are discussed.  相似文献   

4.
Because of the requirements of stringent latency, high‐connection density, and massive devices concurrent connection, the design of the security and efficient access authentication for massive devices is the key point to guarantee the application security under the future fifth Generation (5G) systems. The current access authentication mechanism proposed by 3rd Generation Partnership Project (3GPP) requires each device to execute the full access authentication process, which can not only incur a lot of protocol attacks but also result in signaling congestion on key nodes in 5G core networks when sea of devices concurrently request to access into the networks. In this paper, we design an efficient and secure privacy‐preservation access authentication scheme for massive devices in 5G wireless networks based on aggregation message authentication code (AMAC) technique. Our proposed scheme can accomplish the access authentication between massive devices and the network at the same time negotiate a distinct secret key between each device and the network. In addition, our proposed scheme can withstand a lot of protocol attacks including interior forgery attacks and DoS attacks and achieve identity privacy protection and group member update without sacrificing the efficiency. The Burrows Abadi Needham (BAN) logic and the formal verification tool: Automated Validation of Internet Security Protocols and Applications (AVISPA) and Security Protocol ANimator for AVISPA (SPAN) are employed to demonstrate the security of our proposed scheme.  相似文献   

5.
无线异构网络的关键安全技术   总被引:1,自引:0,他引:1  
异构网络的融合及协同工作在下一代公众移动网络中将是一个很普遍的问题,无线异构网络融合技术作为改善公众移动网络的覆盖和容量以及提供无处不在的通信能力、接入Internet的能力和无处不在的移动计算能力的有效手段,已引起广泛的关注,有着良好的应用前景。构建无线异构网络的安全防护体系,研究新型的安全模型、关键安全技术和方法,是无线异构网络发展过程中所必须关注的重要问题。无线异构网络中的关键安全技术包括安全路由协议、接入认证技术、入侵检测技术、节点间协作通信等。  相似文献   

6.
Distributed cooperative MAC for multihop wireless networks   总被引:2,自引:0,他引:2  
This article investigates distributed cooperative medium access control protocol design for multihop wireless networks. Cooperative communication has been proposed recently as an effective way to mitigate channel impairments. With cooperation, single-antenna mobile terminals in a multi-user environment share antennas from other mobiles to generate a virtual multipleantenna system that achieves more reliable communication with a higher diversity gain. However, more mobiles conscribed for one communication inevitably induces complex medium access interactions, especially in multihop wireless ad hoc networks. To improve the network throughput and diversity gain simultaneously, we investigate the issues and challenges in designing an efficient MAC scheme for such networks. Furthermore, based on the IEEE 802.11 DCF, a cross-layer designed cooperative MAC protocol is proposed. The MAC scheme adapts to the channel condition and payload length.  相似文献   

7.
Security in mobile ad hoc networks: challenges and solutions   总被引:13,自引:0,他引:13  
Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. Unlike the wireline networks, the unique characteristics of mobile ad hoc networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium, stringent resource constraints, and highly dynamic network topology. These challenges clearly make a case for building multifence security solutions that achieve both broad protection and desirable network performance. In this article we focus on the fundamental security problem of protecting the multihop network connectivity between mobile nodes in a MANET. We identify the security issues related to this problem, discuss the challenges to security design, and review the state-of-the-art security proposals that protect the MANET link- and network-layer operations of delivering packets over the multihop wireless channel. The complete security solution should span both layers, and encompass all three security components of prevention, detection, and reaction.  相似文献   

8.
Mobile ad hoc networks and wireless sensor networks have promised a wide variety of applications. However, they are often deployed in potentially adverse or even hostile environments. Therefore, they cannot be readily deployed without first addressing security challenges. Intrusion detection systems provide a necessary layer of in-depth protection for wired networks. However, relatively little research has been performed about intrusion detection in the areas of mobile ad hoc networks and wireless sensor networks. In this article, first we briefly introduce mobile ad hoc networks and wireless sensor networks and their security concerns. Then, we focus on their intrusion detection capabilities. Specifically, we present the challenge of constructing intrusion detection systems for mobile ad hoc networks and wireless sensor networks, survey the existing intrusion detection techniques, and indicate important future research directions.  相似文献   

9.
Many scholastic researches have begun around the globe about the competitive technological interventions like 5G communication networks and its challenges. The incipient technology of 6G networks has emerged to facilitate ultrareliable and low-latency applications for sustainable smart cities which are infeasible with the existing 4G/5G standards. Therefore, the advanced technologies like machine learning (ML), block chain, and Internet of Things (IoT) utilizing 6G network are leveraged to develop cost-efficient mechanisms to address the issues of excess communication overhead in the present state of the art. Initially, the authors discussed the key vision of 6G communication technologies, its core technologies (such as visible light communication [VLC] and THz), and the existing issues with the existing network generations (such as 5G and 4G). A detailed analysis of benefits, challenges, and applications of blockchain-enabled IoT devices with application verticals like Smart city, smart factory plus, automation, and XR that form the key highlights for 6G wireless communication network is also presented. In addition, the key applications and latest research of artificial intelligence (AI) in 6G are discussed facilitating the dynamic spectrum allocation mechanism and mobile edge computing. Lastly, an in-depth study of the existing open issues and challenges in green 6G communication network technology, as well as review of solutions and potential research recommendations are also presented.  相似文献   

10.
With the rapid development of third-generation wireless mobile communication systems worldwide, the wireless mobile ATM enhanced software radio platform has taken the lead in the implementation process, which helps construct a broadband wireless pipe and “IP over wmATM” open signaling suite to support various common air interfaces for the wireless industry. This article presents the implementational issues using the IP over wmATM solution for 3G broadband wireless mobile communication systems. It includes the design of the wmATM medium access controller, protocol stack, wmATM module definition, and software radio platform, as well as IP unified 3G wireless networks  相似文献   

11.
Advances in network architecture, enhancements in signaling protocols, provisioning of end-to-end QoS, worldwide seamless mobility, and flexible service provision are among the major research challenges toward next-generation wireless networks. The integration and interoperability of all these technologies, along with new truly broadband wireless innovations and intelligent user-oriented services will lead toward the so-called 4G wireless networks. In this article we identify the key issues of an innovative transparent IP radio access system that targets 4G networks.  相似文献   

12.
The popularity of wireless communication systems can be seen almost everywhere in the form of cellular networks, WLANs, and WPANs. In addition, small portable devices have been increasingly equipped with multiple communication interfaces building a heterogeneous environment in terms of access technologies. The desired ubiquitous computing environment of the future has to exploit this multitude of connectivity alternatives resulting from diverse wireless communication systems and different access technologies to provide useful services with guaranteed quality to users. Many new applications require a ubiquitous computing environment capable of accessing information from different portable devices at any time and everywhere. This has motivated researchers to integrate various wireless platforms such as cellular networks, WLANs, and MANETs. Integration of different technologies with different capabilities and functionalities is an extremely complex task and involves issues at all layers of the protocol stack. This article envisions an architecture for state-of-the-art heterogeneous multihop networks, and identifies research issues that need to be addressed for successful integration of heterogeneous technologies for the next generation of wireless and mobile networks.  相似文献   

13.
The 4G or Beyond 3G wireless networks is consist of IP-based heterogeneous access networks from 3G cellular, WiFi, WiMAX to other emerging access technologies such as mesh networks. The key objective of designing the next generation wireless networks is to support of mobile subscribers. To support the mobile host in the hybrid wireless access technologies, many solutions based on network protocol stack have been proposed in the literature. In this article, after review of mobility concepts, a special attention is given to some of the mobility management methods as well as handover techniques across various wireless access networks. We have also compared the major mobility protocols in each layer for their features. Finally, some of the open issues that needed to be addressed in mobility management protocol in the next generation wireless networks are outlined.  相似文献   

14.
Device‐to‐device (D2D) communication in the fifth‐generation (5G) wireless communication networks (WCNs) reuses the cellular spectrum to communicate over the direct links and offers significant performance benefits. Since the scarce radio spectrum is the most precious resource for the mobile‐network operators (MNOs), optimizing the resource allocation in WCNs is a major challenge. This paper proposes an adaptive resource‐block (RB) allocation scheme for adequate RB availability to every D2D pair in a trisectored cell of the 5G WCN. The hidden Markov model (HMM) is used to allocate RBs adaptively, promoting high resource efficiency. The stringent quality‐of‐service (QoS) and quality‐of‐experience (QoE) requirements of the evolutionary 5G WCNs must not surpass the transmission power levels. This is also addressed while using HMM for RB allocation. Thus, an energy‐efficient RB allocation is performed, with higher access rate and mean opinion score (MOS). Cell sectoring effectively manages the interference in the 5G networks amid ultrauser density. The potency of the proposed adaptive scheme has been verified through simulations. The proposed scheme is an essential approach to green communication in 5G WCNs.  相似文献   

15.
An exponential growth in data demand on wireless networks and wireless link capacity approaching its theoretical limits, bound us to find new solutions and innovative network designs to handle the enormous amount of traffic. In this paper, we discuss long term evolution-advance (LTE-A) heterogeneous networks (HetNets) being a most effective solution to break this wireless cellular capacity crunch. LTE-A HetNets provide adequate increase in capacity by utilizing multi-tier architecture consisting of different type of cells i.e macro cell, small cell, relay and device to device. However this increase in capacity comes with certain challenges in HetNets outlined in this article. Considering inter cell interference coordination (ICIC) as biggest challenge in LTE-A HetNets, this article surveys state of the art LTE-A HetNets deployments with focus on ICIC. Effective ICIC techniques allow further substantial capacity increase. We give state of the art ICIC on air-interface as well as backhaul strategies for effective ICIC in LTE-A HetNets. Operators perspective of LTE-A HetNets with some insight to future of 5G LTE-A HetNets is provided. We also provide simulation results to show how LTE-A HetNets lead to realize ambitious targets of 5G technology in terms of capacity.  相似文献   

16.
程定国  曾浩洋 《电讯技术》2023,63(3):441-447
对无线网络流量的分析和准确预测是无线网络管理与安全领域的重要研究内容之一,在网络规划、网络监控、流量趋势分析、网络优化以及入侵检测和异常检测等方面发挥着重要作用。介绍了目前典型的无线网络流量分析的模型与常用流量分析方法,综述了传统无线通信网络(如无线局域网和物联网)中的流量分析技术,指出了流量分析技术应用于无线自组网系统的可能性与面临的几点挑战,以及无线自组网系统与流量分析技术结合的发展方向。  相似文献   

17.
The growth of wireless communication toward fifth generation will lead to the existence of number of access technologies to provide seamless connectivity and form heterogeneous network environment. Earlier, there was single access technology to run applications, but 5G will have heterogeneous network environment and provide separate network for each application. As compared with 4G, 5G will provide increase in data rate, decrease in delay, increase in quality of service, and so on because of its various enabling technologies. Therefore, for each application, selection of best access network via its enabling technology is an important task. This selection is done either at user terminal side or at network operator side by combining preferences for network attributes and network parameters. In this paper, to enjoy 5G, selection is done in a heterogeneous networks environment for enabling technologies like device‐to‐device communication, spectrum sharing, enhancing quality of experience, energy efficiency, and so on. This selection is done via optimization techniques for a fixed duration video clip that is to be transmitted from a device running low in battery. The selection environment composed of UMTS, WLAN1, and WLAN2 as available networks. The simulation results show that the network selected for each enabling technology supports various features of 5G. Also, error analysis of selection results is done using confidence interval estimate at 90%, 92%, and 95% confidence level. From results obtained, it is seen that different optimization techniques used to access network for different enabling technologies (providing 5G features) prove to be useful for future 5G network.  相似文献   

18.
Scarce radio resources and the ambition to increase the number of mobile customers with a guarantee of service are pushing mobile communication systems from homogeneous non‐service convergent 2G and convergent‐service 2.5G and 3G wireless systems to heterogeneous integrated and convergent service 4G networks. This evolution has had several consequences from network design, control and service management points of view. In the emerging integrated 4G networks one of the issues is the signalling of information related to different control purposes such as QoS, mobility and security signalling. In fact, some questions such as which are the candidate signalling protocols, and which approach of integrated signalling to be adopted (unified versus non‐unified) need to be considered in the context of the emerging 4G integrated network. This is precisely the scope of this paper. We first identify the requirements related to mobility, security/AAA and QoS signalling, then we consider candidate signalling protocols and we propose possible approaches in the integration of signalling in the context of 4G networks. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

19.
With the advancement of video-compression technology and the wide deployment of wireless networks, there is an increasing demand for wireless video communication services, and many design challenges remain to be overcome. In this article, we discuss how to dynamically allocate resources according to the changing environments and requirements, so as to improve the overall system performance and ensure individual quality of service (QoS). Specifically, we consider two aspects with regard to design issues: cross-layer design, which jointly optimizes resource utilization from the physical layer to the application layer, and multiuser diversity, which explores source and channel heterogeneity for different users. We study how to efficiently transmit multiple video streams, encoded by current and future video codecs, over resource-limited wireless networks such as 3G/4G cellular system and future wireless local/metropolitan area networks (WLANs/WMANs).  相似文献   

20.
The future 5G wireless is triggered by the higher demand on wireless capacity. With Software Defined Network (SDN), the data layer can be separated from the control layer. The development of relevant studies about Network Function Virtualization (NFV) and cloud computing has the potential of offering a quicker and more reliable network access for growing data traffic. Under such circumstances, Software Defined Mobile Network (SDMN) is presented as a promising solution for meeting the wireless data demands. This paper provides a survey of SDMN and its related security problems. As SDMN integrates cloud computing, SDN, and NFV, and works on improving network functions, performance, flexibility, energy efficiency, and scalability, it is an important component of the next generation telecommunication networks. However, the SDMN concept also raises new security concerns. We explore relevant security threats and their corresponding countermeasures with respect to the data layer, control layer, application layer, and communication protocols. We also adopt the STRIDE method to classify various security threats to better reveal them in the context of SDMN. This survey is concluded with a list of open security challenges in SDMN.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号