期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
EAP协议及其应用 被引量:6
1
作者 王璐 曹秀英 《通信技术》 2002年第7X期70-71,75,共3页
认证服务是无线局域网的一种最重要的安全服务。介绍了可扩展认证协议,分析研究了它的类型及应用。
关键词 无线局域网 认证 可扩展认证协议 RADIUS
原文传递
A framework of hybrid authentication for link access under MIH environments
2
作者 Kangsuk Chae Jiman Mun Souhwan Jung 《Journal of Measurement Science and Instrumentation》 CAS 2012年第4期362-369,共8页
A unified hybrid authentication framework was proposed to provide proactive authentication and re-authentication for media independent handover(MIH)-based multi-wireless access. In addition, a specific protocol dist... A unified hybrid authentication framework was proposed to provide proactive authentication and re-authentication for media independent handover(MIH)-based multi-wireless access. In addition, a specific protocol distributing a hierarchi- cal key after the proactive authentication from key holder to base station has been proposed. The proposed hybrid authenti- cation framework not only performs proaetive authentication with credentials based on Chameleon hashing, which removes the authentication procedures that exchanges messages with a authentication server, but also performs re-authentication with EAP re-authentication protocol(ERP) that distributes the hierarchical key on the basis of the root key generated by the pro- active authentication. 展开更多
关键词 hybrid authentication vertical handover media independent handover(MIH) chameleon hashing extensible authentication protocol(EAP) EAP re-authentication protocol(ERP)
在线阅读 下载PDF
一种向下兼容Modbus扩展协议在变频器通信系统中的应用
3
作者 黄华毅 《变频器世界》 2017年第9期83-84,97,共3页
针对Modbus协议在变频器通信系统的应用中,出现的数据格式长度固定16bit、数据即时保存、跨型号变频器参数地址检索等问题,提出了一种向下兼容Modbus扩展协议应用方案。本文介绍了向下兼容Modbus扩展协议的内容、原理以及实现方法。在... 针对Modbus协议在变频器通信系统的应用中,出现的数据格式长度固定16bit、数据即时保存、跨型号变频器参数地址检索等问题,提出了一种向下兼容Modbus扩展协议应用方案。本文介绍了向下兼容Modbus扩展协议的内容、原理以及实现方法。在实际客户应用中,向下兼容Modbus扩展协议有效解决了上述问题,得到客户的一致认可。 展开更多
关键词 变频器 MODBUS 扩展协议
在线阅读 下载PDF
Enhancing security in the ISO 15118-20 EV charging system
4
作者 Ross Porter Morteza Biglari-Abhari +1 位作者 Benjamin Tan Duleepa Thrimawithana 《Green Energy and Intelligent Transportation》 2025年第6期99-109,共11页
Electric Vehicle(EV)‘DC Fast Charging’systems directly connect an EV's battery to an external charger.A compromised EV charger may damage the EV or be used as part of a demand-side power grid attack.We show that... Electric Vehicle(EV)‘DC Fast Charging’systems directly connect an EV's battery to an external charger.A compromised EV charger may damage the EV or be used as part of a demand-side power grid attack.We show that the newest charging standard ISO 15118–20 is not sufficient to prevent charging attacks,as it provides no mechanism to verify charger integrity.We present system and threat models for the attack,before defining an extension to ISO 15118–20 that adds support for firmware integrity verification through remote attestation,while remaining interoperable with non-supporting devices.A proof of concept implementation demonstrates the security improvement by protecting against the specified attack while requiring only 85 bytes of secure storage,8 kB of working memory,and adding less than 0.5 s to the length of a charging session.Backwards compatibility with an implementation of the original standard is also demonstrated. 展开更多
关键词 ISO 15118–20 EV charging Remote attestation protocol extension Cyber-physical systems CYBERSECURITY
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部