首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
It is shown that the capacity scaling of wireless networks is subject to a fundamental limitation which is independent of power attenuation and fading models. It is a degrees of freedom limitation which is due to the laws of physics. By distributing uniformly an order of n users wishing to establish pairwise independent communications at fixed wavelength inside a two-dimensional domain of size of the order of n, there are an order of n communication requests originating from the central half of the domain to its outer half. Physics dictates that the number of independent information channels across these two regions is only of the order of radicn, so the per-user information capacity must follow an inverse square-root of n law. This result shows that information-theoretic limits of wireless communication problems can be rigorously obtained without relying on stochastic fading channel models, but studying their physical geometric structure.  相似文献   

2.
This paper describes the security features incorporated into the third generation (3G) mobile system developed in 3GPP, specifically the enhancements to the shared secret symmetric authentication scheme as used in GSM. The proposed security architecture for the Internet multimedia subsystem (IMS) based on and built upon Internet applications, services and protocols, is then described. Finally, the paper describes some early work by 3GPP to integrate public key security mechanisms into 3G, while maintaining the global reach and call set-up performance, that mobile users now take for granted.  相似文献   

3.
总的强度跟最薄弱的环节一样 这是句老话,但也是实在话.它绝对适用于这种情况:一个网络的安全性的极限由它最薄弱的环节决定.黑客、垃圾信息狂、身份盗用者以及其他的一切犯罪分子,都是靠寻找系统的薄弱点来下手的.这些点可以是接入点,也可能是网络采用的安全保密协议,甚至可能是连接设备本身.  相似文献   

4.
为了达到与有线网络相同的安全性,IEEE802.11协议在MAC层引入安全机制,提供鉴别和保密服务。其核心是协议定义的WEP(wired equivalent privacy)算法。本文系统地介绍IEEE802.11的安全机制的构成以及认证、加密、和WEP算法,对其安全性能进行分析,指出存在的安全隐患。并对当前关于增强无线局城网安全性的有关方案进行探讨。  相似文献   

5.
根据IDC最新调查显示,72%的企业称其曾遭遇过互联网安全破坏,39%的企业感到安全威胁程度比2002年有所提高。Gartner指出2005年20%的企业将会遭遇一次严重的互联网安全事故。这种威胁不仅仅是电脑病毒,还包括犯罪信息和知识产权问题。据韩国国家警察局(Korean National Police Agency)统计,自2001年8月至2002年3月期间,韩国共收到了4,376个关于安全破坏和黑客袭击的报告,占全世界在线攻击总量的39%。美国、中国和台湾分别位居第二、第三和第四。  相似文献   

6.
Security in Wireless Communication   总被引:4,自引:0,他引:4  
Security is a critical issue in mobile radio applications both forthe users and providers of such systems. Although the same may besaid of all communications systems, mobile application havespecial requirements and vulnerabilities, and are therefore ofspecial concern. Emerging wireless networks share many commoncharacteristics with traditional wire-line networks such as publicswitch telephone/data networks, and hence many security issueswith the wire-line networks also apply to the wirelessenvironment. However the integration of security features intowireless communication must take into account restrictions thatmay apply to their use such as small packet size, low bandwidth,high transmission costs, limited processing and storage resourcesand real time constraints. In this paper security requirements inwireless communications along with security features in 2G and 3Gsystems are described.  相似文献   

7.
近年来,随着互联网科技的不断发展,无线网络的应用已经越来越广泛。文章阐述了无线网络存在的各种安全隐患和漏洞,实现安全保护时需要注意的问题,以及如何进行保护。  相似文献   

8.
通过了解无线局域网的组成和工作原理,分析影响安全的因素,并通过加密、认证等手段以及应用完整的安全解决方案,从而更好地做到无线局域网的安全防护.  相似文献   

9.
无线局域网(WLAN)是国内外通信领域的应用热点,由于WLAN的传输特性而导致了其安全隐患。在分析了WLAN的工作特点、部件和组网结构的基础上,对其安全性能、威胁模式和安全对策进行了讨论。最后给出了安全建议。  相似文献   

10.
近年来随着无线局域网的不断发展,政府、公司、医院、学校、餐厅、家庭等公共场所都被无线网络覆盖,但是由于无线网采用的是开放式电磁波方式传递数据,如何识别有效的用户和保护用户隐私问题变得越来越突出。文章研究了从技术上提高无线局域网的安全性的方法,并对几种不同的方法进行对比。  相似文献   

11.
Security and privacy issues in RFID technology gain tremendous popularity recently. However, existing work on RFID authentication problems always make assumptions such as (1) hash function can be fully employed in designing RFID protocols; (2) channels between readers and server are always secure. The first assumption is not suitable for EPC Class-1 Gen-2 tags, which has been challenged in many research work, while the second one cannot be directly adopted in mobile RFID applications where wireless channels between readers and server are always insecure. To solve these problems, in this paper, we propose a novel ultralightweight and privacy-preserving authentication protocol for mobile RFID systems. We only use bitwise XOR, and several special constructed pseudo-random number generators to achieve our aims in the insecure mobile RFID environment. We use GNY logic to prove the security correctness of our proposed protocol. The security and privacy analysis show that our protocol can provide several privacy properties and avoid suffering from a number of attacks, including tag anonymity, tag location privacy, reader privacy, forward secrecy, and mutual authentication, replay attack, desynchronization attack etc. We implement our protocol and compare several parameters with existing work, the evaluation results indicate us that our protocol significantly improves the system performance.  相似文献   

12.
无线局域网的安全性   总被引:1,自引:0,他引:1  
张羽 《电子技术》2002,29(11):41-44
文章介绍了wirelessLAN安全性和常用的几种无线网络安全技术。  相似文献   

13.
Wireless Network Security and Interworking   总被引:1,自引:0,他引:1  
A variety of wireless technologies have been standardized and commercialized, but no single technology is considered the best because of different coverage and bandwidth limitations. Thus, interworking between heterogeneous wireless networks is extremely important for ubiquitous and high-performance wireless communications. Security in interworking is a major challenge due to the vastly different security architectures used within each network. The goal of this paper is twofold. First, we provide a comprehensive discussion of security problems and current technologies in 3G and WLAN systems. Second, we provide introductory discussions about the security problems in interworking, the state-of-the-art solutions, and open problems.  相似文献   

14.
WLAN的安全实现机制   总被引:1,自引:1,他引:0  
文章根据无线局域网面临的安全风险和安全需求,分析了无线局域网几种安全实现机制的缺陷及改进方案,指出了新的加密和数据完整性机制、新的认证协议框架以及无线网络不断融合对无线局域网安全方面的影响。  相似文献   

15.
无线局域网络安全研究   总被引:1,自引:0,他引:1  
论文通过介绍无线局域网络的体系结构,以及局域网络的应用现状,分析和总结了无线局域网络的安全问题。并通过对系统的假设和对两种类型的节点加入网络过程的详细阐述,提出了一种适用于无线局域网络节点加入的安全协议。最后展望了下一步的工作重点。  相似文献   

16.
Traditional physical security policy considers an intentional use of budgets and a way of using physical spaces. It represents difficulties in responses to the environment, which is dynamically changed, because the plan is determined as static and stereotypical manners. Thus, in this study a wireless IP camera is used as a method that expands monitoring ranges in existing physical spaces in order to propose a security service structure that can support instantaneous detections and responses to disasters. Although the effort for protecting facilities and equipments using a video monitoring system using wireless IP cameras for temporal threats is a proper way for providing a physical security service according to needs of an adaptable security level. Moreover, if a security level for a specific section is to be upgraded according to changes in external environments, the security level, which is guaranteed by periodic guard patrols, can be improved and supported using a wireless IP camera-based video monitoring system for 24 h during the period to be required. Also, it is possible to establish an environment that enables instantaneous detections and responses for a moment of accidents through performing a continuous video monitoring work from the beginning of rainfall to a dangerous level of flooding.  相似文献   

17.
无线传感网络安全改进方案研究   总被引:2,自引:2,他引:0  
介绍了无线传感网络的发展现状和网络应用的特点,详细描述了时变加密技术的工作原理和在无线传感网络中的应用。针对时变加密密钥在无线传感网络中容易出现丢失和误码,从而导致网络中的感应节点与控制节点安全数据传输失效的缺点,提出了密钥预传输的解决方案。该方法在不缩短节点寿命的前提下,大大提高了无线传感网络的安全性和节点数据传输的稳定性。  相似文献   

18.
本文介绍了基于IEEE 802.11 WLAN的安全机制,分析了有线等效保密协议(WEP)的工作原理及存在的安全漏洞,并对802.11i安全协议进行了详细的阐述。  相似文献   

19.
无线网络技术的广泛应用在为网络用户带来巨大灵活性和便利性的同时,也为传统网络安全领域带来了一系列新的问题和挑战,该文在分析使用无线网络所面临的各种安全威胁的基础上,讨论了构建无线网络安全防护体系的原则和方法.  相似文献   

20.
无线传感器网络的安全技术研究   总被引:2,自引:1,他引:2  
无线传感器网络(WSN)是通过无线通信方式形成的一个多跳自组织网络,是集信息采集、信息传输、信息处理于一体的智能化信息系统。由于其本身资源方面存在的局限性和脆弱性,使其安全问题成为一大挑战。文中分析了无线传感器网络的安全需求、可能受到的安全攻击,给出了防御方法和解决方案。通过安全加密协议、认证流广播和多种密钥机制实现传感器网络的数据机密性、完整性和系统鲁棒性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号