首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
近场无线通信(NFC)是一种已经被广泛应用的短距无线通信技术.其中最常见的是将NFC技术应用于移动支付和门禁访问控制等应用.从技术上讲,这些应用利用NFC模拟卡模式将NFC设备模拟成银行卡或门禁卡,然后等待外部阅读器验证.在这类应用场景下,选取合适的安全认证方案是非常重要的.首先,介绍了现有的NFC认证系统和安全方案并分析了系统安全需求和潜在的安全风险.然后,采用Hash、AES和口令Key动态更新机制,提出了一种适用于NFC移动设备的双向认证安全方案,并设计了自同步机制.最后,利用GNY逻辑以形式化证明的形式证明了方案的安全性,分析表明该方案能解决伪造、重放攻击、窃听、篡改、异步攻击等安全问题.  相似文献   

2.
For communicating short data sequences over small distances, the use of devices with conventional wireless radio frequency interfaces requires standardized hardware, dedicated infrastructure and appropriate Link/Network layer protocols. To address challenges associated with these requirements, a communication mechanism using devices which support simple audio interfaces (speakers and microphones) is proposed using the upper audio band (UAB) of frequencies (16–20 kHz). Devices with audio interfaces can be deployed in a personal area network for communicating at low data rates over small distances. Multi-tone FSK modulation is used for transmitting Reed–Solomon encoded data over the UAB. For peer-to-peer communication applications, a sensing mechanism is enabled on the receiving device to sense for empty time–frequency slots and schedule its data transmission at the appropriate times. A system prototype is developed using portable speakers and smartphones with sensitive microphones. The effective throughput of the modem is evaluated for different sensing durations and distances. Ad-hoc peer-to-peer networks can be enabled between mobile devices for communicating short data sequences based on the UAB modem.  相似文献   

3.
In light of the increasing acceptance of the notion of next generation networks (NGN), which results from the convergence of the fixed and mobile telecommunications, Internet, and entertainment sectors, there is a need for the realization of next-generation service delivery platforms to allow seamless and adaptive provisioning of multimedia information and communication services to mobile users. This means that in such an NGN environment different end systems, access networks, and service platforms have to be integrated. For this highly heterogeneous communications and services environment, we propose a self-adaptive service provisioning middleware framework (ASPF), which, by interoperating with existing wireless and wireline service delivery platforms, aims to enable seamless omnipresent service provisioning to mobile users anywhere, anytime, and in any context. The ASPF is intended to "liberate" applications from space and time limitations, networks, platforms, and device dependences, minimize time-to-market constraints, and eliminate major hurdles that hinder the rapid deployment of new mobile services and applications. Key to this goal is interworking/integration with current SDPs, such as IN/CAMEL, OSA/Parlay, and the emerging IMS.  相似文献   

4.
5.
杨彬  王兵 《电子测试》2016,(23):116-117
智能移动设备不断接近传统计算环境的性能和可扩展性.但这些新的功能和应用使移动设备成为攻击者和恶意软件的攻击目标.本文分析了移动设备所面临的安全挑战,深入研究了移动设备的安全模型.  相似文献   

6.
The intense wireless LAN standardization and R&D activities worldwide, combines with the recent successful deployment of WLANs, provide prime evidence that WLAN technology will play a key role in the fourth generation of mobile data networks. In this context, there is a strong need to integrate WLANs with 3G mobile data networks and develop hybrid mobile data networks capable of ubiquitous data services and very high data rates in strategic locations. This article addresses this need by proposing and discussing some novel architectures able to provide internetworking between WLAN and 3G networks, and meet the requirements of the most common internetworking scenarios. These architectures can enable 3G subscribers to benefit from high-throughput IP connectivity in hotspots and also to attain service roaming across several radio access technologies, such as IEEE 802.11, HiperLan/2, ULTRAN, and GERAN.  相似文献   

7.
8.
4G移动通信系统引入的协作通信技术在提高系统性能的同时也带来了新的安全隐患。从挖掘协议安全缺陷出发,通过分析4G系统的安全协议和机制,讨论了系统中存在的安全缺陷,总结了可能遭受的攻击方式,并以此为基础给出了一种规避针对4G系统协作通信攻击的身份认证机制,该机制能够有效改善4G移动通信系统协作环境下的安全性。  相似文献   

9.
杨茹 《信息技术》2015,(1):169-171
文中主要对交通电子政务3G移动办公的安全技术进行研究。从移动办公平台自身的特点出发,分析该平台可能遭受到的安全威胁,进行移动办公平台安全体系结构设计,并针对主要安全威胁,提出了交通电子政务3G网络办公安全解决方案,以最大限度地提高该平台的稳定性和安全性。  相似文献   

10.
This paper describes a new methodology of pattern exhibition for digital media that can conceal an imperceptible but recognizable watermark on the media captured with mobile devices. From the human perception, the imperceptible watermark of marked media can preserve the fidelity and readability of the image’s content. With the designed, window-based histogram operation, the embedded pattern of the marked media can be exhibited and recognized visually. That is, the designed mechanism can satisfy the essentials of both visible and invisible watermarking techniques to promote significant pattern sharing and identification for mobile applications. Simulations demonstrate that the peak signal-to-noise ratio (PSNR) of the marked image is superior (around 50–70 dB) to many of the existing watermarking algorithms. The process is of low computational complexity, efficient and can be applied in the real world via mobile devices via inner histogram operation.  相似文献   

11.
Wireless Networks - One of the biggest challenges in political mayhem is visible during the election process where no stone is kept unturned in order to gain the power. Further, due to poll...  相似文献   

12.
13.
A low-cost reconfigurable embedded apparatus for two-dimensional (2-D) motion detection has been developed. This paper briefly outlines the embedded reconfigurable system architecture, and presents in-depth the 2-D motion detection model, which is directly mapped to reconfigurable hardware. Emphasis is placed on the hardware ability to adapt to individual needs of kinetically challenged persons by altering detection thresholds and delays, thus resulting into an efficient low-cost reconfigurable hardware implementation of the model. This paper also presents how the model detects complex motions through a vocabulary of simple motions, and how the system is trained to individual users' needs. Experimental results and integrated applications of the model for text processing are also presented.  相似文献   

14.
文章提出一种可应用于4G/5G工作频段且应用分集技术解耦的8×8频率可重构MIMO系统。八天线阵列中包括4个可切换于2.6 GHz频段和3.5 GHz频段的频率可重构天线模块以及4个应用于3.5 GHz频段的5G模块。由于频率可重构技术的应用,该系统可满足网络传输速率等多种要求,进一步提高终端设备的空间利用率和系统应用的灵活性。文章给出了MIMO系统切换前后的S参数和包络相关系数等参数的计算结果,结果显示出多天线阵列的可应用性。  相似文献   

15.
手机钱包业务中提供了空中充值功能,用户从客户端发起充值请求,OTA服务器验证身份后处理请求。国内移动支付领域,多数OTA加解密使用的是DES的变体3DES算法,其密钥相对较短,且有弱密钥。同类算法中,AES性能最好,较大的数据可以利用AES进行分段加密。文章提出基于AES的Mac校验方式,研究双向身份认证机制的原理和流程,并根据OTA下载的功能需求,提出可应用于手机钱包业务中的多级动态密钥方案。  相似文献   

16.
手机钱包业务中提供了空中充值功能,用户从客户端发起充值请求,OTA服务器验证身份后处理请求。国内移动支付领域,多数OTA加解密使用的是DES的变体3DES算法,其密钥相对较短,且有弱密钥。同类算法中,AES性能最好,较大的数据可以利用AES进行分段加密。文章提出基于AES的Mac校验方式,研究双向身份认证机制的原理和流程,并根据OTA下载的功能需求,提出可应用于手机钱包业务中的多级动态密钥方案。  相似文献   

17.
18.
The software protection technology is the main component of modern software security technology. Generally, confusion and encryption methods are using in software protection technology to provide traditional desktop applications. But applications based on mobile devices are also faces with threats such as piracy and tampering. The security problem in existing applications for mobile devices will do far more harm to users than traditional virus, but there is no effective software protection security framework for them. A software application framework for mobile devices is proposed in this paper, and the white box decryption algorithm involved is improved. And it is analyzed in this paper the performance and security of the framework proposed, the operational efficiency of the improved encryption algorithm is verified.  相似文献   

19.
This paper discusses current status and recent advancements of 3D graphics on mobile platforms and describes open issues concerning its usage in different applications. We have treated two particular application fields. Firstly, we deal with problems of visualization of complex data structures on mobile devices. The implementation of a 3D visualization renderer on the Symbian platform for mobile devices is written as a C++ application and based on the DieselEngine® as a rendering engine. 3D visualization of data is generated in the form of a Virtual Reality Modelling Language (VRML) file meaning that actually any kind of 3D content written in VRML file format can be rendered on such a device. It was the result of a project the objective of which was to provide a user interface on a mobile platform displaying visualization of hierarchical Grid monitoring data. Secondly, we describe the system that brings face animation to embedded platforms. Face animation is considered to be one of the toughest tasks in computer animation today and its delivery to mobile platforms brings possibilities for development of new innovative and attractive services for the mobile market.  相似文献   

20.
A mobile teletrauma system using 3G networks   总被引:3,自引:0,他引:3  
This paper introduces a cost-effective portable teletrauma system that assists health-care centers in providing prehospital trauma care. Simultaneous transmission of a patient's video, medical images, and electrocardiogram signals, which is required throughout the prehospital procedure, is demonstrated over commercially available 3G wireless cellular data service. Moreover, the physician can remotely control the information sent from the patient side. Such a technology will allow a trauma specialist to be virtually present at the remote location and participate in prehospital care, which improves the quality of trauma care and can potentially reduce mortality and morbidity. To alleviate the limited and fluctuant bandwidth barriers of the wireless cellular link, the system adapts to network conditions through media transformations, data prioritization, and application-level congestion control methods. Experimental evaluation of the system prototype over real network conditions, transmitting different media types between the trauma patient and hospital unit, is encouraging. The teletrauma system reported in this paper is the first of its kind and it provides a basis for future enhancements.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号