共查询到20条相似文献,搜索用时 125 毫秒
1.
2.
3.
4.
5.
802.11无线网络WPA安全体系的研究 总被引:6,自引:0,他引:6
从现有的无线局域网的安全问题入手,研究了最新的无线局域网安全协议WPA,其中包括了802.1X认证协议和TKIP安全加密算法,并对即将推出的802.11i安全协议进行了介绍. 相似文献
6.
UPnP设备权限控制及安全协议的研究与设计 总被引:1,自引:0,他引:1
UPnP协议已经越来越多的应用到局域网络以及家庭智能网络中,但是由UPnP带来的安全问题也越来越受到重视,并且相关的解决方案很少。本文在介绍UPnP组成及工作流程的同时,也对UPnP容易引起的安全问题进行分析,进而作者提供了一种由安全控制台来对设备进行权限控制、设备和控制点之间进行加密传输的安全协议。此安全协议能够有效保护数据完整性、保护信息的不可抵赖、防止重发攻击等。 相似文献
7.
诊断主体授权问题是车辆远程故障诊断中的关键问题。针对当前车辆远程诊断授权协议(PVAUDS)中存在的问题,提出了新的车辆远程诊断授权协议(PVAUDS+)。在保证原协议安全目标的前提下,为诊断主体提供双向认证和票据新鲜性验证,并保证发送票据的可信第三方能够有效抵御拒绝服务攻击。使用安全协议证明工具ProVerif对PVAUDS+协议的安全属性进行自动化证明,通过增加发起代价的机制解决对可信第三方的拒绝服务攻击问题,从而说明PVAUSD+协议能够满足提出的安全目标。定量分析结果说明本协议具有较好的可行性。 相似文献
8.
传感器网络系统安全中安全路由协议是非常重要的环节,而且也制约着无线传感器网络的使用。安全路由协议的设计和实现由于传感器网络本身的一些特性而面临着挑战。文章对攻击网络层的各种形式进行了总结,从需求、研究现状等方面对路由协议的安全问题进行了分析,并提出了解决这些问题的方式,指明了未来研究的重点。 相似文献
9.
21世纪是信息高速传递的时代,人们对快捷数据访问的需求急剧增加,传统的有线网络已无法满足人们的需求,无线局域网应运而生。但由于无线局域网信道的开放性,其安全问题越发突出。为了实现安全的网络接入,对可扩展身份验证协议-传输层安全性(EAP-TLS)协议进行了研究,详细分析了协议中可能出现的安全漏洞以及其可能遭受到的安全威胁,最后对该协议存在的不足之处进行了改进。 相似文献
10.
认证协议是网络环境中一类重要的安全协议,对协议进行形式化分析是保障其安全性的主要手段。文章以BAN逻辑为工具.分析了网络中常用的Kerbems认证协议。结果表明。Kerbems协议达到了预期的认证目标。 相似文献
11.
本文首先分析了现有电子邮件系统及其安全问题,然后归纳出一个安全的电子邮件系统应该具有的基本特性。而要实现安全电子邮件,必须借助于密码算法。因此在最后提出了如何基于PKI,设计一个安全的电子邮件系统。 相似文献
12.
13.
Abdelhafid Abouaissa Mohamed‐el‐Amine Brahmia Pascal Lorenz 《International Journal of Communication Systems》2013,26(1):1-12
In this paper, we discuss the issue of fairness in the IEEE802.11e over wireless mesh networks. Fairness is an important factor that we have to achieve before talking about QoS. Inspired by social networks approximations, and to achieve fairness and provide QoS by regulating heterogeneous traffic, we extended the original IEEE802.11e protocol by introducing a new algorithm based on the ‘token bucket’ concept. We also treat the problem of exposed/hidden nodes. Simulation results show that the proposed approach offers better performance than the IEEE802.11e one. Copyright © 2011 John Wiley & Sons, Ltd. 相似文献
14.
15.
Petrank E. Roth R.M. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1997,43(5):1602-1604
We study the computational difficulty of deciding whether two matrices generate equivalent linear codes, i.e., codes that consist of the same codewords up to a fixed permutation on the codeword coordinates. We call this problem code equivalence. Using techniques from the area of interactive proofs, we show on the one hand, that under the assumption that the polynomial-time hierarchy does not collapse, code equivalence is not NP-complete. On the other hand, we present a polynomial-time reduction from the graph isomorphism problem to code equivalence. Thus if one could find an efficient (i.e., polynomial-time) algorithm for code equivalence, then one could settle the long-standing problem of determining whether there is an efficient algorithm for solving graph isomorphism 相似文献
16.
Hendriks R.F.M. van Exter M.P. Woerdman J.P. 《Quantum Electronics, IEEE Journal of》1999,35(7):1057-1061
We discuss how the polarization dependence of the saturation in vertical-cavity surface emitting lasers (VCSELs) can be influenced by the design of the quantum-well (QW) gain medium. As an important concept in our discussion, we use carrier reservoirs, i.e., we separate the carrier population into a number of subpopulations. Specifically, we treat VCSELs in which the carriers are separated on the basis of their spin, their momentum, or on the basis of their spatial position. By numerically analyzing the rate equations for one specific case, we show how a properly chosen polarization dependence of the saturation leads to polarization self-modulation 相似文献
17.
Álvaro García-Martín Ricardo Sánchez-Matilla José M. Martínez 《Signal, Image and Video Processing》2017,11(7):1181-1188
In this paper, we address one of the most typical problems of person detection: scenarios with the presence of groups of persons. In this kind of scenarios, traditional person detectors have difficulties as they have to deal with several simultaneous occlusions. In order to try to solve this problem, we propose the use of two different hierarchies. The first one consists of a hierarchy of persons, i.e., the use of the detection of different persons belonging to a group in order to refine the individual’s detections. The second one consists of a hierarchy of parts, i.e., the use of different combinations of body parts in order to refine the final detections. Experimental results over several video sequences show that the proposed hierarchies significantly improve the results with respect to different approaches from the state of the art. 相似文献
18.
Random waypoint mobility model in cellular networks 总被引:2,自引:0,他引:2
In this paper we study the so-called random waypoint (RWP) mobility model in the context of cellular networks. In the RWP model the nodes, i.e., mobile users, move along a zigzag path consisting of straight legs from one waypoint to the next. Each waypoint is assumed to be drawn from the uniform distribution over the given convex domain. In this paper we characterise the key performance measures, mean handover rate and mean sojourn time from the point of view of an arbitrary cell, as well as the mean handover rate in the network. To this end, we present an exact analytical formula for the mean arrival rate across an arbitrary curve. This result together with the pdf of the node location, allows us to compute all other interesting measures. The results are illustrated by several numerical examples. For instance, as a straightforward application of these results one can easily adjust the model parameters in a simulation so that the scenario matches well with, e.g., the measured sojourn times in a cell. 相似文献
19.
讨论用16个能产生混沌现象的方程来检测带有未知相位的微弱正弦信号。16个相位已经确定的方程的阈值事先求解出来。当未知相位的信号通过系统时,逐个验证方程,看是否有混沌向大尺度周期运动转变的方程,如果有,则此方程可以作为检测信号的方程,若没有则继续实验,最后必然会出现一个甚至多个相轨迹转变的方程。用能够出现相轨迹转变的方程... 相似文献
20.
规则序列与奇异非线性移存器--求解快速自启动反馈函数 总被引:2,自引:0,他引:2
本文提出由非线性移存器产生规则序列的问题 ,它的用途之一是可以用来取代移位计数器传统的逻辑设计。研究表明 ,求解快速自启动产生规则序列这一问题其实质就是要寻找一个或一批奇异非线性移存器 ,且使它或它们的状态图仅有一个带若干短枝的圈。文中用状态转移变换的方法证明了一批快速自启动产生规则序列的奇异非线性移存器。 相似文献