共查询到20条相似文献,搜索用时 15 毫秒
1.
Franceschetti M. Migliore M.D. Minero P. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2009,55(8):3413-3424
It is shown that the capacity scaling of wireless networks is subject to a fundamental limitation which is independent of power attenuation and fading models. It is a degrees of freedom limitation which is due to the laws of physics. By distributing uniformly an order of n users wishing to establish pairwise independent communications at fixed wavelength inside a two-dimensional domain of size of the order of n, there are an order of n communication requests originating from the central half of the domain to its outer half. Physics dictates that the number of independent information channels across these two regions is only of the order of radicn, so the per-user information capacity must follow an inverse square-root of n law. This result shows that information-theoretic limits of wireless communication problems can be rigorously obtained without relying on stochastic fading channel models, but studying their physical geometric structure. 相似文献
2.
C W Blanchard 《BT Technology Journal》2001,19(3):67-75
This paper describes the security features incorporated into the third generation (3G) mobile system developed in 3GPP, specifically the enhancements to the shared secret symmetric authentication scheme as used in GSM. The proposed security architecture for the Internet multimedia subsystem (IMS) based on and built upon Internet applications, services and protocols, is then described. Finally, the paper describes some early work by 3GPP to integrate public key security mechanisms into 3G, while maintaining the global reach and call set-up performance, that mobile users now take for granted. 相似文献
3.
4.
张晓宏 《信息技术与信息化》2006,(1):56-58
为了达到与有线网络相同的安全性,IEEE802.11协议在MAC层引入安全机制,提供鉴别和保密服务。其核心是协议定义的WEP(wired equivalent privacy)算法。本文系统地介绍IEEE802.11的安全机制的构成以及认证、加密、和WEP算法,对其安全性能进行分析,指出存在的安全隐患。并对当前关于增强无线局城网安全性的有关方案进行探讨。 相似文献
5.
6.
Security in Wireless Communication 总被引:4,自引:0,他引:4
Security is a critical issue in mobile radio applications both forthe users and providers of such systems. Although the same may besaid of all communications systems, mobile application havespecial requirements and vulnerabilities, and are therefore ofspecial concern. Emerging wireless networks share many commoncharacteristics with traditional wire-line networks such as publicswitch telephone/data networks, and hence many security issueswith the wire-line networks also apply to the wirelessenvironment. However the integration of security features intowireless communication must take into account restrictions thatmay apply to their use such as small packet size, low bandwidth,high transmission costs, limited processing and storage resourcesand real time constraints. In this paper security requirements inwireless communications along with security features in 2G and 3Gsystems are described. 相似文献
7.
8.
通过了解无线局域网的组成和工作原理,分析影响安全的因素,并通过加密、认证等手段以及应用完整的安全解决方案,从而更好地做到无线局域网的安全防护. 相似文献
9.
无线局域网(WLAN)是国内外通信领域的应用热点,由于WLAN的传输特性而导致了其安全隐患。在分析了WLAN的工作特点、部件和组网结构的基础上,对其安全性能、威胁模式和安全对策进行了讨论。最后给出了安全建议。 相似文献
10.
11.
Security and privacy issues in RFID technology gain tremendous popularity recently. However, existing work on RFID authentication problems always make assumptions such as (1) hash function can be fully employed in designing RFID protocols; (2) channels between readers and server are always secure. The first assumption is not suitable for EPC Class-1 Gen-2 tags, which has been challenged in many research work, while the second one cannot be directly adopted in mobile RFID applications where wireless channels between readers and server are always insecure. To solve these problems, in this paper, we propose a novel ultralightweight and privacy-preserving authentication protocol for mobile RFID systems. We only use bitwise XOR, and several special constructed pseudo-random number generators to achieve our aims in the insecure mobile RFID environment. We use GNY logic to prove the security correctness of our proposed protocol. The security and privacy analysis show that our protocol can provide several privacy properties and avoid suffering from a number of attacks, including tag anonymity, tag location privacy, reader privacy, forward secrecy, and mutual authentication, replay attack, desynchronization attack etc. We implement our protocol and compare several parameters with existing work, the evaluation results indicate us that our protocol significantly improves the system performance. 相似文献
13.
Wireless Network Security and Interworking 总被引:1,自引:0,他引:1
Shin M. Ma J. Mishra A. Arbaugh W.A. 《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》2006,94(2):455-466
A variety of wireless technologies have been standardized and commercialized, but no single technology is considered the best because of different coverage and bandwidth limitations. Thus, interworking between heterogeneous wireless networks is extremely important for ubiquitous and high-performance wireless communications. Security in interworking is a major challenge due to the vastly different security architectures used within each network. The goal of this paper is twofold. First, we provide a comprehensive discussion of security problems and current technologies in 3G and WLAN systems. Second, we provide introductory discussions about the security problems in interworking, the state-of-the-art solutions, and open problems. 相似文献
14.
15.
无线局域网络安全研究 总被引:1,自引:0,他引:1
朱猛 《信息安全与通信保密》2007,(1):104-108
论文通过介绍无线局域网络的体系结构,以及局域网络的应用现状,分析和总结了无线局域网络的安全问题。并通过对系统的假设和对两种类型的节点加入网络过程的详细阐述,提出了一种适用于无线局域网络节点加入的安全协议。最后展望了下一步的工作重点。 相似文献
16.
Traditional physical security policy considers an intentional use of budgets and a way of using physical spaces. It represents difficulties in responses to the environment, which is dynamically changed, because the plan is determined as static and stereotypical manners. Thus, in this study a wireless IP camera is used as a method that expands monitoring ranges in existing physical spaces in order to propose a security service structure that can support instantaneous detections and responses to disasters. Although the effort for protecting facilities and equipments using a video monitoring system using wireless IP cameras for temporal threats is a proper way for providing a physical security service according to needs of an adaptable security level. Moreover, if a security level for a specific section is to be upgraded according to changes in external environments, the security level, which is guaranteed by periodic guard patrols, can be improved and supported using a wireless IP camera-based video monitoring system for 24 h during the period to be required. Also, it is possible to establish an environment that enables instantaneous detections and responses for a moment of accidents through performing a continuous video monitoring work from the beginning of rainfall to a dangerous level of flooding. 相似文献
17.
无线传感网络安全改进方案研究 总被引:2,自引:2,他引:0
介绍了无线传感网络的发展现状和网络应用的特点,详细描述了时变加密技术的工作原理和在无线传感网络中的应用。针对时变加密密钥在无线传感网络中容易出现丢失和误码,从而导致网络中的感应节点与控制节点安全数据传输失效的缺点,提出了密钥预传输的解决方案。该方法在不缩短节点寿命的前提下,大大提高了无线传感网络的安全性和节点数据传输的稳定性。 相似文献
18.
19.
无线网络技术的广泛应用在为网络用户带来巨大灵活性和便利性的同时,也为传统网络安全领域带来了一系列新的问题和挑战,该文在分析使用无线网络所面临的各种安全威胁的基础上,讨论了构建无线网络安全防护体系的原则和方法. 相似文献
20.
无线传感器网络的安全技术研究 总被引:2,自引:1,他引:2
无线传感器网络(WSN)是通过无线通信方式形成的一个多跳自组织网络,是集信息采集、信息传输、信息处理于一体的智能化信息系统。由于其本身资源方面存在的局限性和脆弱性,使其安全问题成为一大挑战。文中分析了无线传感器网络的安全需求、可能受到的安全攻击,给出了防御方法和解决方案。通过安全加密协议、认证流广播和多种密钥机制实现传感器网络的数据机密性、完整性和系统鲁棒性。 相似文献