期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Key Technologies of Wireless Heterogeneous Network Security 被引量:2
1
作者 Wu Meng,Ji Lina,Wang Kun(Nanjing University of Posts and Telecommunications,Nanjing 210003,China) 《ZTE Communications》 2008年第3期34-39,共6页
Convergence and collaboration of heterogeneous networks in the next generation public mobile networks will be a subject of universal significance. Convergence of heterogeneous networks, as an effective approach to imp... Convergence and collaboration of heterogeneous networks in the next generation public mobile networks will be a subject of universal significance. Convergence of heterogeneous networks, as an effective approach to improve the coverage and capacity of public mobile network, to enable communication services, to provide Internet access and to enable mobile computing from everywhere, has drawn widespread attention for its good prospects in application. Construction of security system for wireless heterogeneous networks and development of new security models, key security techniques and approaches are critical and mandatory in heterogeneous networks development. Key technology of wireless heterogeneous networks security covers security routing protocol, access authentication, intrusion detection system, cooperative communication between nodes, etc. 展开更多
关键词 Key Technologies of wireless Heterogeneous network security NODE WLAN
在线阅读 下载PDF
Cloud-Network-End Collaborative Security for Wireless Networks:Architecture,Mechanisms,and Applications
2
作者 Xiangyu Wang Jianfeng Ma 《Tsinghua Science and Technology》 2025年第1期18-33,共16页
The core goal of network security is to protect the security of data sharing.Traditional wireless network security technology is committed to guaranteeing end-to-end data transmission security.However,with the advance... The core goal of network security is to protect the security of data sharing.Traditional wireless network security technology is committed to guaranteeing end-to-end data transmission security.However,with the advancement of mobile networks,cloud computing,and Internet of Things,communication-computing integration and cloud-network integration have been important technical routes.As a result,the main application requirements of wireless networks have changed from data transmission to cloud-based information services.Traditional data transmission security technology cannot overcome the security requirements of cloud-network-end collaborative services in the new era,and secure semantic communication has become an important model.To address this issue,we propose a cloud-network-end collaborative security architecture.Firstly,we clarify security mechanisms for end system security,network connection security,and cloud services security,respectively.Next,based on the above three aspects,we elaborate on the connotation of cloud-network-end collaborative security.By giving example applications,including heterogeneous network secure convergence framework,unmanned system collaborative operations security framework,and space-air-ground integrated network security framework,we demonstrate the universality of the proposed architecture.Finally,we review the current research on end system security,network connection security,and cloud services security,respectively. 展开更多
关键词 wireless network security information services security secure semantic communication model cloud-network-end collaborative security architecture heterogeneous network secure convergence
原文传递
Scheme of Rogue AP detection in managed WLAN based on AP's location
3
作者 Kwontaek Lim Jiawei Shao +1 位作者 Jonghoon Lee Souhwan Jung 《Journal of Measurement Science and Instrumentation》 CAS 2012年第4期370-373,共4页
A scheme of rogue access point(Rogue AP)detection based on AP's localization is proposed.Global position system(GPS)information and received signal strength(RSS)information are used to get the location of AP in a ... A scheme of rogue access point(Rogue AP)detection based on AP's localization is proposed.Global position system(GPS)information and received signal strength(RSS)information are used to get the location of AP in a smartphone,which is compared with the database located in a remote server.The proposed scheme can detect not only fake access point(Fake AP)but also Evil Twin AP.It can be a user-oriented solution to detecting Rogue AP threats,and users can use it flexibly. 展开更多
关键词 rogue access point(Rogue AP) wireless local area network(WLAN) security Evil Twin attacks
在线阅读 下载PDF
SAC-TA: A Secure Area Based Clustering for Data Aggregation Using Traffic Analysis in WSN 被引量:1
4
作者 Mohanbabu Gopalakrishnan Gopi Saminathan Arumugam +1 位作者 Karthigai Lakshmi Shanmuga Vel 《Circuits and Systems》 2016年第8期1404-1420,共17页
Clustering is the most significant task characterized in Wireless Sensor Networks (WSN) by data aggregation through each Cluster Head (CH). This leads to the reduction in the traffic cost. Due to the deployment of the... Clustering is the most significant task characterized in Wireless Sensor Networks (WSN) by data aggregation through each Cluster Head (CH). This leads to the reduction in the traffic cost. Due to the deployment of the WSN in the remote and hostile environments for the transmission of the sensitive information, the sensor nodes are more prone to the false data injection attacks. To overcome these existing issues and enhance the network security, this paper proposes a Secure Area based Clustering approach for data aggregation using Traffic Analysis (SAC-TA) in WSN. Here, the sensor network is clustered into small clusters, such that each cluster has a CH to manage and gather the information from the normal sensor nodes. The CH is selected based on the predefined time slot, cluster center, and highest residual energy. The gathered data are validated based on the traffic analysis and One-time Key Generation procedures to identify the malicious nodes on the route. It helps to provide a secure data gathering process with improved energy efficiency. The performance of the proposed approach is compared with the existing Secure Data Aggregation Technique (SDAT). The proposed SAC-TA yields lower average energy consumption rate, lower end-to-end delay, higher average residual energy, higher data aggregation accuracy and false data detection rate than the existing technique. 展开更多
关键词 Data Aggregation False Data Injection Attacks Malicious Nodes One-Time Key Generation Secure One-Time (SOT) Key and wireless Sensor networks (WSNs)
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部