首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
图像传输技术在各个领域都有着广泛的用途,当前运用最广的是有线传输,但是在传输过程中也遇到各种困难,比如安装有线困难,成本高,场地有着严格的要求。伴随着无线技术的成熟与推广,无线传输得到飞速发展。本文中将使用Wi Fi无线传输模块,利用无线技术来优化DSP图像数据的传输。以TMS320DM642为处理核心,用FPGA来辅助和实现图像处理。  相似文献   

2.
基于WiFi无线传输远程视频监控的研究   总被引:2,自引:0,他引:2  
针对传统的视频监控技术在远程监控中成本高,应用效率低的问题。文中结合嵌入式开发、WiFi与图形图像技术,提出了一种基于WiFi无线传输远程视频监控的方法。该方法以MJPG-Streamer作为服务器,通过无线WiFi进行视频数据传输,配置路由器完成端口转换,利用QT Creater设计软件实现多摄像头监控画面显示和录像。实验表明,传输视频清晰、流畅,系统稳定、可靠,具有良好的扩展性和易用性。  相似文献   

3.
随着现代社会科技水平的不断提高和通信技术的愈加完善,定位技术受到了用户越来越多的关注.WiFi定位技术具有在室内获取便利、 覆盖范围广、 信息传输速度快和搭建成本低廉等优点而得到了广泛的应用.提出了一种基于WiFi技术的位置指纹定位算法,称为快速定位算法,极大地提高了计算效率,并且仍然能够保持室内定位的精确性.基于此,设计并实现了应用于Android终端的室内定位系统.  相似文献   

4.
介绍了基于IP的无线核心网络中影响话音传输质量的原因及其常用的解决方法,并从改进话音传输协议、进行业务量控制和提高话音分组处理效率几个方面,提出了改善话音传输质量的具体实现方法。  相似文献   

5.
基于PKI技术的网络安全策略   总被引:2,自引:0,他引:2  
阐述了基于公开密钥理论与技术的PKI理论,介绍了PKI系统运行机理,作用及其基本组成,并详细分析了公开密钥算法。  相似文献   

6.
7.
在当今社会中,计算机网络已经深入到社会的各个方面,无线传感器网络应用也越来越加普及,对人们的生活、国家安全以及其他各行各业都产生了极大影响,确保无线传感器网络安全是十分必要的,本文就针对以混沌加密为基础的无线传感器网络安全技术展开研究。  相似文献   

8.
无线局域网安全技术研究   总被引:20,自引:0,他引:20  
本文针对现有无线局域网标准IEEE802.11的安全机制的严重不足,深入分析了基于IEEE802.1X的扩展认证协议(EAP)和Kerberos认证协议,阐述了加密算法中WEP/WEP2和AES的解决方案,并对密钥再生技术做了初步探讨,最后给出了进一步的研究方向。  相似文献   

9.
无线传感器网络安全技术被广泛的应用在各个领域,因此,研究无线传感器网络安全技术具有重要的意义。本文首先分析了无线传感器的安全目标,阐述了无线传感器的安全特性,提出了无线传感器网络安全技术的对策。  相似文献   

10.
无线传感器网络低成本灵活易组织,部控传感器节点采集敏感数据,利用无线信道方便传输数据的同时也面临很大的安全威胁.无线传感器网络受自身资源的限制,传统无线网络安全防护机制无法直接应用于此.针对数据相关性的多跳无线传感器网络中的数据泄露、毁坏、篡改和伪造,提出一种基于双重扰动压缩感知WSN轻量级高性能的数据传输安全机制,不...  相似文献   

11.
无线Mesh网络(Wireless Mesh Networks,WMN)是下一代网络中的新型技术,和传统网络不同,它可以不依赖任何固定的设施,主机可以相互依赖保持网络连接。WISP可以利用它提供快速、简单、低廉的网络部署,然而存在一个主要的挑战就是易于遭受攻击。文中介绍了无线Mesh网络的体系机构以及特点,分析并研究其存在的安全性威胁以及现有的关键安全解决机制。  相似文献   

12.
Wireless sensor network is more prone to adversary compare to common wireless network. This is due to the nature of wireless sensor network that involves many nodes, thus making the system more vulnerable. Another reason is the nature of wireless sensor network as an ad hoc network, making it having no hierarchal structure, complicating management tasks. Deploying new technology without security in mind has often proved to be unreasonably dangerous.One of the most fundamental rights in a 'healthy' society is the right of every citizen to be left alone. Article 12 of the U.N, Universal Declaration of Human Rights, states that “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence.”, in reality, though this right is increasingly being trod upon, along with undreamed of comforts and conveniences for the population in general. The digital revolution has made it possible to gather as well as store information about human behaviour on a massive scale. We leave electronic footprints everywhere we go, footprints that are being watched, analyzed and sold without our knowledge or even control.With this Security and Privacy solutions are mandatory aspects when developing new pervasive technologies such as wireless sensor networks (WSN).This paper analyses the security issues, threats and attacks and requirements of wireless sensor networks. This paper further proposes security framework and security architecture to integrate existing technologies with WSN technology, to provide secure and private communications to its users. Neeli Rashmi Prasad, Associate Professor and Head of Wireless Security and Sensor Networks Lab., part of Wireless Network including Embedded systems Group (WING), Center for TeleInfrastruktur (CTIF), Aalborg University, Aalborg, Denmark. She received her Ph.D. from University of Rome “Tor Vergata”, Rome, Italy, in the field of “adaptive security for wireless heterogeneous networks” in 2004 and M.Sc. (Ir.) degree in Electrical Engineering from Delft University of Technology, The Netherlands, in the field of “Indoor Wireless Communications using Slotted ISMA Protocols” in 1997. She joined Libertel (now Vodafone NL), Maastricht, The Netherlands as a Radio Engineer in 1997. From November 1998 till May 2001, she worked as Systems Architect for Wireless LANs in Wireless Communications and Networking Division of Lucent Technologies (now Agere Systems), Nieuwegein, The Netherlands. From June 2001 to July 2003, she was with T-Mobile Netherlands, The Hague, The Netherlands as Senior Architect for Core Network Group. Subsequently, from July 2003 to April 2004, she was Senior Research Manager at PCOM:I3, Aalborg, Denmark.During her industrial career she coordinated several projects. Just to name few major ones: country wide GSM landmass coverage (Vodafone NL), the impact of IP based security on Lucent WLAN (Wavelan later known as Orinoco) Access Points (APs), implementation of Virtual LAN and IAPP on Orinoco APs, VoIP implementation on APs, design and implementation of real-time embedded software platform for APs, mobile core network evolution towards All-IP for T-Mobile International to technical project lead for Public WLAN deployment for T-Mobile NL.Her publications range from top journals, international conferences and chapters in books. She has also co-edited and co-authored two books titled “WLAN Systems and Wireless IP for Next Generation Communications” and “Wireless LANs and Wireless IP Security, Mobility, QoS and Mobile Network Integration”, published by Artech House, 2001 and 2005. She has supervised several Masters Students projects.In December 1997 she won Best Paper award for her work on ISMA Protocol (Inhibit Sense Multiple Access). Her current research interest lies in wireless security, mobility, mesh networks, WSN, WPAN and heterogeneous networks.She was the Technical Program Committee Co-Chair IWS2005/WPMC05 held on September 18–22, 2005 in Aalborg. She is the Project Coordinator of EC Network of Excellence Project CRUISE on Wireless Sensor Networks. She is also cluster leader of EC Cluster for Sensor Networks. Mahbubul Alam, Ph.D. student at Center for TeleInfrastruktur (CTIF), Aalborg University, Denmark. He is with Cisco Systems, Inc. Netherlands from 2001 and worked as Consulting Systems Engineer in the field of mobile and wireless technology and since September 2002 he works as Business Analyst in areas of mobile, wireless and security. He is now based in Cisco Systems, Inc. San Jose, CA, USA, with focus on home networking, wireless and security. Previously he was with Siemens Netherlands as Systems Engineer and as Technical Team Leader of UMTS group. He received M. Sc. degree in Electrical & Electronic Engineering from Delft University of Technology, The Netherlands in 1998. He has published several papers at international conferences, journals, IEEE communication magazine and chapters for books. His research interest is in the field of wireless sensor networks.  相似文献   

13.
WiFi通信的安全分析   总被引:1,自引:0,他引:1  
通过分析当前应用广泛的WiFi技术以及WEP的工作过程,讲述其中存在的安全问题,从发现的缺陷中讲解破解方法,同时简单介绍国产WAPI技术情况。  相似文献   

14.
针对近距离无线控制和轻小便携的需求,设计了一种新型的手持控制终端.采用以ARM9处理器S3C2440为核心的硬件平台和以Linux系统为核心的软件平台,在此基础上采用Qt技术开发控制界面的应用程序.通过WiFi模块和USB实现了ARM与数据采集设备的两种通信方式,具有参数设置、参数回读、数据采集和存储及数据显示的功能.经实验证明,系统具有良好的可靠性和稳定性.  相似文献   

15.
日常应用及工程测绘中经常需要扫描采集大幅平面图像,针对普通的图像扫描仪或者数码相机等图像采集设备很难满足要求或者无法实现的问题,系统地介绍了一种基于WiFi无线传输的平面图像数据采集技术,该系统主要由图像采集处理、WiFi传输、接收端图像拼接三部分构成,利用多种传感器的数据融合实现了上述功能,可以很好地解决大幅图像采集、拼接显示等问题.该系统构造简单,应用范围广,传输可靠,适合于需要进行无线图像采集的多种场合应用.  相似文献   

16.
无线局域网络安全技术研究   总被引:4,自引:2,他引:4  
分析了现有的无线局域网(WLAN)标准IEEE802.11b的WEP安全机制及其在加密和认证上的漏洞,SPRNG协议用同步伪随机码发生器产生认证变量,并为每帧数据加密,是基于双向认证和加密;并分析了其实现技术的复杂性和安全性。  相似文献   

17.
无线传感器网络安全研究与分析   总被引:1,自引:0,他引:1  
本文简要介绍了无线传感器网络的技术,分析了无线传感器网络的安全机制,分析了物理层,链路层和网络层的攻击和防御等问题,并对解决这些安全问题的关键技术进行了讨论。  相似文献   

18.
本文介绍了无线传感器网络发展现状及其应用情况,分析了无线传感网存在的安全问题及面临的安全威胁,并综合考虑无线传感网存在的自身限制,给出了保障无线传感器网络安全的综合解决方案,为无线传感器网络大范围推广应用提供了技术支撑。  相似文献   

19.
雷洁 《中国新通信》2008,10(19):33-35
网络安全是无线传感器网络应用的前提和基础。考虑到主要的网络威胁,公钥加密和基于公钥的密钥管理对于WSN来说是最为安全也是最有效地安全措施。随后对一些典型算法进行了分析,并指出了无线传感器网络的下一步发展方向。  相似文献   

20.
无线传感器网络安全方案研究   总被引:2,自引:1,他引:2  
本文分析TWSN的安全问题,提出了一种新的WSN安全方案.此方案在网络初始化时采用预分配密钥方法来建立网络安全体系,减少通信开销,在网络运行时采用基于能量的动态分簇算法维护网络安全,优化网络生命周期.并且在这个基础上,提出了一种基于能量的多路径冗余传输来识别恶意节点.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号