Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is ...Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is analyzed with the CK (Canetti-Krawczyk) model and the BAN (Burrows-Abadi- Needham) logic. Results show that it can achieve the alleged authentication and key negotiation goals. Besides those alleged, further analyses indicate that the authentication access process can satisfy other security requirements, such as mutual identity authentication, mutual key control, key confirmation, message integrity check, etc. If the used elliptic curve encryption algorithm and the hash algorithm are secure enough, the protocol can efficiently realize mutual authentication between STAs (station) and APs (access point). Therefore, WAPI can be applied to replace the security mechanism used in the original WLAN international standard to enhance its security.展开更多
Wireless Sensor Networks(WSN)has been extensively utilized as a communication model in Internet of Things(IoT).As well,to offer service,numerous IoT based applications need effective transmission over unstable locatio...Wireless Sensor Networks(WSN)has been extensively utilized as a communication model in Internet of Things(IoT).As well,to offer service,numerous IoT based applications need effective transmission over unstable locations.To ensure reliability,prevailing investigations exploit multiple candidate forwarders over geographic opportunistic routing in WSNs.Moreover,these models are affected by crucial denial of service(DoS)attacks,where huge amount of invalid data are delivered intentionally to the receivers to disturb the functionality of WSNs.Here,secure localization based authentication(SLA)is presented to fight against DoS attack,and to fulfil the need of reliability and authentication.By examining state information,SLA projects a trust model to enhance efficacy of data delivery.Indeed,of the prevailing opportunistic protocols,SLA guarantees data integrity by modelling a trust based authentication,providing protection against DoS attackers and diminishing computational costs.Specifically,this model acts as a verification strategy to accelerate?attackers and to handle isolation.This strategy helps SLA in eliminating duplicate transmission and by continuous verification that results from conventional opportunistic routing.Simulation is performed in a MATLAB environment that offers authentic and reliable delivery by consuming approximately 50%of the cost in contrast to other approaches.The anticipated model shows better trade off in comparison to the prevailing ones.展开更多
The security of wireless local area network (WI.AN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to t...The security of wireless local area network (WI.AN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to the serious secure leak in IEEES02.11 standards, it is impossible to utterly solve the problem by simply adding some remedies. Based on the analysis on the security mechanism of WLAN and the latest techniques of WI.AN security, a solution to WLAN security was presented. The solution makes preparation for the further combination of WLAN and Internet.展开更多
随着医院信息化建设的推进,无线局域网已成为支撑医疗业务的重要基础设施。医院环境中高密度终端对实时数据传输和网络安全的高要求,给无线局域网的设计与部署带来了挑战。针对这些需求,分析无线局域网在医院场景中的技术设计,涵盖无线...随着医院信息化建设的推进,无线局域网已成为支撑医疗业务的重要基础设施。医院环境中高密度终端对实时数据传输和网络安全的高要求,给无线局域网的设计与部署带来了挑战。针对这些需求,分析无线局域网在医院场景中的技术设计,涵盖无线网络性能需求、高密度用户场景下的多无线接入点(Access Point,AP)协同组网、医疗数据传输的服务质量(Quality of Service,QoS)保障机制等内容。通过案例分析,提出适应医院环境的设计方案,确保医疗业务的稳定性与实时性,为医院无线网络的优化与设计提供理论支持与实践指导。展开更多
A scheme of rogue access point(Rogue AP)detection based on AP's localization is proposed.Global position system(GPS)information and received signal strength(RSS)information are used to get the location of AP in a ...A scheme of rogue access point(Rogue AP)detection based on AP's localization is proposed.Global position system(GPS)information and received signal strength(RSS)information are used to get the location of AP in a smartphone,which is compared with the database located in a remote server.The proposed scheme can detect not only fake access point(Fake AP)but also Evil Twin AP.It can be a user-oriented solution to detecting Rogue AP threats,and users can use it flexibly.展开更多
针对无线体域网(wireless body area network,WBAN)结合云计算时的数据通信与用户隐私安全问题,提出使用多值和模糊方案(multi-valued and ambiguous scheme,MAS)解决云辅助WBAN中的数据安全问题。首先概述MAS算法,给出该算法的加...针对无线体域网(wireless body area network,WBAN)结合云计算时的数据通信与用户隐私安全问题,提出使用多值和模糊方案(multi-valued and ambiguous scheme,MAS)解决云辅助WBAN中的数据安全问题。首先概述MAS算法,给出该算法的加密和推理过程;然后将该算法应用于云辅助WBAN,并证明该算法能有效保证云端与WBAN间的数据通信安全,同时结合现存的加密算法提供了一种实现该算法的实例;最后验证算法的效率,实验结果显示,输入数据从0~900 KB增加的过程中,算法的加密总时间始终保持在5 s以内,低于DES和AES算法,解密总时间大部分在22 s以内,优于DES和AES算法,该算法可以很好地用于解决云辅助WBAN的数据安全问题。展开更多
作为一种新的电子医疗技术,无线体域网(wireless body area networks,WBANs)将在病情监测中发挥重要作用,安全性及隐私性保护是无线体域网的重要内容。针对WBANs数据访问控制提出一种细粒度的数据访问方法,该方法采用基于属性的数据加...作为一种新的电子医疗技术,无线体域网(wireless body area networks,WBANs)将在病情监测中发挥重要作用,安全性及隐私性保护是无线体域网的重要内容。针对WBANs数据访问控制提出一种细粒度的数据访问方法,该方法采用基于属性的数据加密方法,加密者将数据访问结构作为访问策略,当解密者所具有的属性满足该结构时,即可访问该数据,否则,拒绝用户访问。分别从正确性、安全性及能量消耗三方面对方案进行分析。仿真实验结果表明,本方案相对其他方案能量消耗较小。展开更多
基金The National Basic Research Program of China(973Program) (No.G1999035805)the Natural Science Foundation of ShannxiProvince (No.2007F37)China Postdoctoral Science Foundation (No.20060401008,20070410376).
文摘Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is analyzed with the CK (Canetti-Krawczyk) model and the BAN (Burrows-Abadi- Needham) logic. Results show that it can achieve the alleged authentication and key negotiation goals. Besides those alleged, further analyses indicate that the authentication access process can satisfy other security requirements, such as mutual identity authentication, mutual key control, key confirmation, message integrity check, etc. If the used elliptic curve encryption algorithm and the hash algorithm are secure enough, the protocol can efficiently realize mutual authentication between STAs (station) and APs (access point). Therefore, WAPI can be applied to replace the security mechanism used in the original WLAN international standard to enhance its security.
文摘Wireless Sensor Networks(WSN)has been extensively utilized as a communication model in Internet of Things(IoT).As well,to offer service,numerous IoT based applications need effective transmission over unstable locations.To ensure reliability,prevailing investigations exploit multiple candidate forwarders over geographic opportunistic routing in WSNs.Moreover,these models are affected by crucial denial of service(DoS)attacks,where huge amount of invalid data are delivered intentionally to the receivers to disturb the functionality of WSNs.Here,secure localization based authentication(SLA)is presented to fight against DoS attack,and to fulfil the need of reliability and authentication.By examining state information,SLA projects a trust model to enhance efficacy of data delivery.Indeed,of the prevailing opportunistic protocols,SLA guarantees data integrity by modelling a trust based authentication,providing protection against DoS attackers and diminishing computational costs.Specifically,this model acts as a verification strategy to accelerate?attackers and to handle isolation.This strategy helps SLA in eliminating duplicate transmission and by continuous verification that results from conventional opportunistic routing.Simulation is performed in a MATLAB environment that offers authentic and reliable delivery by consuming approximately 50%of the cost in contrast to other approaches.The anticipated model shows better trade off in comparison to the prevailing ones.
基金The National Natural Science Foundation ofChina(No60703031)The Natural Science Foundation of Shaanxi Province ( No2007F50)
文摘The security of wireless local area network (WI.AN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to the serious secure leak in IEEES02.11 standards, it is impossible to utterly solve the problem by simply adding some remedies. Based on the analysis on the security mechanism of WLAN and the latest techniques of WI.AN security, a solution to WLAN security was presented. The solution makes preparation for the further combination of WLAN and Internet.
文摘随着医院信息化建设的推进,无线局域网已成为支撑医疗业务的重要基础设施。医院环境中高密度终端对实时数据传输和网络安全的高要求,给无线局域网的设计与部署带来了挑战。针对这些需求,分析无线局域网在医院场景中的技术设计,涵盖无线网络性能需求、高密度用户场景下的多无线接入点(Access Point,AP)协同组网、医疗数据传输的服务质量(Quality of Service,QoS)保障机制等内容。通过案例分析,提出适应医院环境的设计方案,确保医疗业务的稳定性与实时性,为医院无线网络的优化与设计提供理论支持与实践指导。
基金The KCC(Korea Communications Commission),Korea,under the R&D program supervised by the KCA(Korea Communications Agency)(KCA-2012-08-911-05-001)
文摘A scheme of rogue access point(Rogue AP)detection based on AP's localization is proposed.Global position system(GPS)information and received signal strength(RSS)information are used to get the location of AP in a smartphone,which is compared with the database located in a remote server.The proposed scheme can detect not only fake access point(Fake AP)but also Evil Twin AP.It can be a user-oriented solution to detecting Rogue AP threats,and users can use it flexibly.
文摘针对无线体域网(wireless body area network,WBAN)结合云计算时的数据通信与用户隐私安全问题,提出使用多值和模糊方案(multi-valued and ambiguous scheme,MAS)解决云辅助WBAN中的数据安全问题。首先概述MAS算法,给出该算法的加密和推理过程;然后将该算法应用于云辅助WBAN,并证明该算法能有效保证云端与WBAN间的数据通信安全,同时结合现存的加密算法提供了一种实现该算法的实例;最后验证算法的效率,实验结果显示,输入数据从0~900 KB增加的过程中,算法的加密总时间始终保持在5 s以内,低于DES和AES算法,解密总时间大部分在22 s以内,优于DES和AES算法,该算法可以很好地用于解决云辅助WBAN的数据安全问题。
文摘作为一种新的电子医疗技术,无线体域网(wireless body area networks,WBANs)将在病情监测中发挥重要作用,安全性及隐私性保护是无线体域网的重要内容。针对WBANs数据访问控制提出一种细粒度的数据访问方法,该方法采用基于属性的数据加密方法,加密者将数据访问结构作为访问策略,当解密者所具有的属性满足该结构时,即可访问该数据,否则,拒绝用户访问。分别从正确性、安全性及能量消耗三方面对方案进行分析。仿真实验结果表明,本方案相对其他方案能量消耗较小。