期刊文献+

基于近场通信的WiFi传输连接方案 被引量:17

WiFi Transmission Connection Scheme Based on Near Field Communication
下载PDF
导出
摘要 利用近场通信(NFC)技术安全性高、便捷和功耗低的特点,提出采用NFC为无线保真(WiFi)传输建立连接的2种方案:NFC触碰传递WiFi局域网的密码和NFC触碰传递上层加密传输的密钥,避免传统WiFi传输通过搜索热点后需经过认证加入局域网的繁琐操作,同时保证数据传输安全性。根据第2种方案实现NFC+WiFi数据传输系统,测试结果表明,该方案的建立设备连接速度和传输速度均快于传统WiFi方式。 Taking advantage of Near Field Communication(NFC) technology's features of exchanging data safe, convenient, lower power consumption, two programs which using NFC to establish connection for WiFi transmission are proposed: passing WiFi LAN password and AES key by NFC touch. The combination of NFC and WiFi transmission can avoid searching the device as WiFi hotspot, taking part in Wireless Local Area Network(WLAN) through complex authentication and other complex operations in the traditional WiFi transmission process while ensuring the security of data transmission, solving complex of connection process, power consumption and other issues. According to one of the two programs, the 'NFC+WiFi' data transmission system is designed and implemented with a good test performance, the speed of establishing connection significantly superior to the traditional WiFi transmission. Test results show that using the program for data transmission between mobile devices will be with high availability.
作者 马捷 鄂金龙
出处 《计算机工程》 CAS CSCD 2013年第6期1-6,共6页 Computer Engineering
基金 科技部科技型中小企业技术创新基金资助项目(10C26211200143)
关键词 近场通信 无线局域网 无线保真 高级加密标准 无线传输 Near Field Communication(NFC) Wireless Local Area Network(WLAN) Wireless Fidelity(WiFi) Advantage EncryptionStandard(AES) wireless transmission
  • 相关文献

参考文献9

  • 1刘辛酉.WiFi通信的安全分析[J].信息通信技术,2009,3(4):50-56. 被引量:19
  • 2Wi-Fi Alliance. Wi-Fi CERTIFIED Wi-Fi Direct. Personal, Portable Wi-Fi Technology[Z]. 2010.
  • 3Fluhrer S, Mantin I, Shamir A. Weaknesses in the Key Scheduling Algorithm of RC4[C]//Proc. of the 8th Annual Workshop on Selected Areas in Cryptography. Toronto, Canada: [s. n.]: 2001.
  • 4Cam-Winget N, Housley R, Wagner D, et al. Security Flaws in 802.11 Data Link Protocols[J]. Communications of the ACM, 2003, 46(5): 35-39.
  • 5Shaked Y, Wool A. Cracking the Bluetooth PIN[C]//Proc. of the 3rd USENIX/ACM Conference on Mobile Systems, Application and Service. Taipei, China: ACM Press, 2005.
  • 6谭凤林,葛临东.蓝牙安全机制分析[J].信息工程大学学报,2002,3(2):76-78. 被引量:9
  • 7NFC Forum. ECMA-340-2004 Near Field Communication Interface and Protocol(NFCIP-1)[S]. 2004.
  • 8NFC Forum. ECMA-352-2004 Near Field Communication Interface and Protocol(NFCIP-2)[S]. 2003.
  • 9Channame T. How NFC Can to Speed Bluetooth Transactions Today[EB/OL]. (2006-02-14). http://www.eetimes.com/design/ communications-design/4012606/How-NFC-can-to-speed-Bluetooth-transactions-151-today.

二级参考文献1

共引文献26

同被引文献106

引证文献17

二级引证文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部