期刊文献+

无线局域网络安全研究 被引量:2

Research of Wireless LAN Security
原文传递
导出
摘要 论文通过介绍无线局域网络的体系结构,以及局域网络的应用现状,分析和总结了无线局域网络的安全问题。并通过对系统的假设和对两种类型的节点加入网络过程的详细阐述,提出了一种适用于无线局域网络节点加入的安全协议。最后展望了下一步的工作重点。 This paper introduces the architecture of wireless sensor network, forecasts application area of wireless sensor network. Some secure problems about wireless sensor network are summarized. After hypothesis of the networks, with describing of two type node join the network, a security protocol of node join of wireless sensor network is introduced Emphases of future work are laid out
作者 朱猛
机构地区 合肥工业大学
出处 《信息安全与通信保密》 2007年第1期104-108,共5页 Information Security and Communications Privacy
关键词 无线局域网络 节点加入 安全协议 wireless sensor network node join security protocol
  • 相关文献

参考文献8

  • 1[1]于海斌,曾鹏.智能无线局域网络系统.北京:科学出版社,2006:16~17.
  • 2[2]Kahn J M,Katz R H,Pister K S J.Mobile Networking for Smart Dust.ACM/IEEE Intl.Conf.on Mobile Computing and Networking(MobiCom 99),Seattle,WA,1999,(8):17-19.
  • 3[3]Pottie G J,Kaiser W J.Wireless intergrated network sensors[J].Communication of the ACM 2000,43(5):51~58.
  • 4[4]Rentala P,Musunuri R,Gandham S,et al.Survey on sensor network.Technical Report,UTDCS-33-02,University of Texas at Dallas,2002.
  • 5[5]孙利民,李建中.无线局域网络.北京:清华大学出版社,2005:4~22.
  • 6[6]何军.无线通信与网络.北京:清华大学出版社,2004,6.
  • 7[7]Hofmeyr S.An Immunological Model of Distribution Detection and its Application to Computer Security[D].University of New Mexico,Albuquerque,1999.
  • 8[8]Sohrabi K,Gao J,Ailawadhi V,et al.Protocols for self-organization of a wireless sensor network.IEEE Personal Communications,2000,7(5):16-27.

同被引文献18

  • 1陈鹤,曹科.无线局域网技术研究与安全管理[J].现代机械,2006(4):77-78. 被引量:19
  • 2Wu L L, Lin C Y, Tseng Y C, et al. A new multi-channel MAC protocol with on-demand channel assignment for multi-hop mobile ad hoc networks[C]//International Symposium on Parallel Architectures, Algorithms and Networks (I-SPAN) Dallas, Texas USA, December 2000.
  • 3Tzamaloukas A, G multiple access with IEEE Device Multime Japan:[s.n.], 2000. arcia-Luna-Aceves packet tra dia Commun ins for ad Channel-hopping networks[C]//In ications (MoMuC' 00), Tokyo.
  • 4Bahl P, Chandra R, Dunagan J. SSCH: Slotted seeded channel hopping for capacity improvement in ieee 802.11 ad hoe wireless networks[C]//In lOth ACM International Conference Mobile Computing and Networking (Mobi-Com 2004), Philadelphia, Pennsylvania - USA:[s.n.], 2004.
  • 5So J, Yaidya N H. Multi-channel mac for ad hoe networks handling multi-channel hidden terminals using a single transceiver[C]// In 5th ACM International Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc 2004), Tokyo Japan: [s.n.],2004:222-233.
  • 6Kemal Bicakci, Bulent countermeasures in Tavli. Denial IEEE 802.11 of-Service attacks and wireless networks[J] Computer Standards & Interfaces, 2008(09):1-11.
  • 7Abderrezak Rachedi, Abderrahim Benslimane. Impacts and solutions of control packets vulnerabilities with IEEE 802. 11 MAC[J]. Wirel. Commun. Mob. Comput. , 2009(09) :469-488.
  • 8Bellardo J,Savage J.802.11 Denial-of-service attacks:Real vulnerabilities and practical solutions[C] //Proceedings of the USENIX Security Symposium.Washington DC,2003:15-28.
  • 9Debar H,Dacier M,Wespi A.Towards a taxonomy of intrusion-detection systems[J].Computer Networks,1999,31(8):805-822.
  • 10Zhou L,Haas Z J.Securing Ad hoc networks[J|.IEEE Network Magazine,1999,13(6):24-30.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部