期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
Key Technologies of Wireless Heterogeneous Network Security 被引量:2
1
作者 Wu Meng,Ji Lina,Wang Kun(Nanjing University of Posts and Telecommunications,Nanjing 210003,China) 《ZTE Communications》 2008年第3期34-39,共6页
Convergence and collaboration of heterogeneous networks in the next generation public mobile networks will be a subject of universal significance. Convergence of heterogeneous networks, as an effective approach to imp... Convergence and collaboration of heterogeneous networks in the next generation public mobile networks will be a subject of universal significance. Convergence of heterogeneous networks, as an effective approach to improve the coverage and capacity of public mobile network, to enable communication services, to provide Internet access and to enable mobile computing from everywhere, has drawn widespread attention for its good prospects in application. Construction of security system for wireless heterogeneous networks and development of new security models, key security techniques and approaches are critical and mandatory in heterogeneous networks development. Key technology of wireless heterogeneous networks security covers security routing protocol, access authentication, intrusion detection system, cooperative communication between nodes, etc. 展开更多
关键词 key Technologies of Wireless Heterogeneous network Security NODE WLAN
下载PDF
Key Technologies of Wireless Mesh Network 被引量:1
2
作者 Wu Fan, Mao Yuming, Zhang Ke (University of Electronic Science and Technology of China , Chengdu 610054, China ) 《ZTE Communications》 2008年第2期25-29,共5页
The Wireless Mesh Network (WMN) is a special kind of Ad hoc network with a hierarchical network structure . Its backbone transmission network has such characteristics as multi- hop , topology stability, no electricity... The Wireless Mesh Network (WMN) is a special kind of Ad hoc network with a hierarchical network structure . Its backbone transmission network has such characteristics as multi- hop , topology stability, no electricity supply constraints , convergence of flows . Improving the spatial reuse of spectrum is an effective approach to increase network capacity. The linchpin of this approach is to effectively control the interference range between wireless links . The multi- channel networking technology is one of the key technologies of WMN, and its core is the channel allocation through which the channel utilization can be maximized . The mutual interference between multi- hop wireless links should be considered when choosing the routing metrics in WMN. Through the load - balancing routing method , the network capacity and throughput of nodes can be improved . 展开更多
关键词 MESH WMN key Technologies of Wireless Mesh network
下载PDF
Ambient Network and Its Key Technologies
3
作者 Cheng Jie,Feng Chunyan(Institute of Communication Networks Integrated Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China) 《ZTE Communications》 2008年第3期40-43,共4页
The Ambient Networks project of European Union has carried out in-depth research on heterogeneous network convergence, where the Ambient Control Space (ACS) is proposed to support dynamic, distributed, self-managing a... The Ambient Networks project of European Union has carried out in-depth research on heterogeneous network convergence, where the Ambient Control Space (ACS) is proposed to support dynamic, distributed, self-managing and self-maintaining management for heterogeneous networks. With the Multi-Radio Access (MRA) architecture, the Ambient Networks take full advantage of multiple access technologies to provide all users with the 'Always Best Connected' services. 展开更多
关键词 RADIO MRA Ambient network and Its key Technologies MAC ACCESS
下载PDF
Key Technologies of 3G WCDMA Network Sharing
4
作者 Zhang Jian (Mobile Division of ZTE Corporation, Shanghai 201203, China) 《ZTE Communications》 2005年第2期5-8,共4页
Based on the latest research findings of 3GPP on network sharing, this paper introduces 4 solutions to WCDMA 3G network sharing: site sharing, common network sharing, geographically split network sharing, and radio ac... Based on the latest research findings of 3GPP on network sharing, this paper introduces 4 solutions to WCDMA 3G network sharing: site sharing, common network sharing, geographically split network sharing, and radio access network sharing. It also analyzes the key network sharing technologies, including the lu-Flex function in Release 5, the UTRAN sharing mechanism in the connected mode in Release 5 and the mechanism of network sharing support enhancement in Release 6. 展开更多
关键词 WCDMA SGSN UTRAN PLMN key Technologies of 3G WCDMA network Sharing
下载PDF
Key MAC Layer Technologies of Cognitive Radio Network
5
作者 Zeng Zhimin, Guo Caili (School of Information and Communication Engineering , Beijing University of Posts and Telecommunications , Beijing 100876 , P . R . China ) 《ZTE Communications》 2009年第2期21-26,共6页
As a smart spectrum sharing technology, Cognitive Radio (CR) is becoming a hot topic in the field of wireless telecommunications. Besides providing traditional services, the cognitive radio network Media Access Contro... As a smart spectrum sharing technology, Cognitive Radio (CR) is becoming a hot topic in the field of wireless telecommunications. Besides providing traditional services, the cognitive radio network Media Access Control (MAC) layer is required to perform an entirely new set of functions for effective reusing spectrum opportunity, without causing any harmful interference to incumbents. Spectrum sensing management selects and optimizes sensing strategies and parameters by the selection of sensing mode, sensing period, sensing time, sensing channel, and sensing quiet period. Access control avoids collision with primary users mainly by cooperation access and transparent access. Dynamic spectrum allocation optimizes the allocation of uncertain spectrum for binary interference model and accumulative interference model. Security mechanism adds authentication and encryption mechanisms to MAC frame to defense MAC layer security attacks. Cross-layer design combines MAC layer information with physical layer or higher layers information, such as network layer, transmission layer, to achieve global optimization. 展开更多
关键词 MAC key MAC Layer Technologies of Cognitive Radio network RADIO
下载PDF
Tackling Key Technological Problems and Advancing 5G Technology Application in Railway
6
作者 ZHOU Li ZHENG Mingda 《Chinese Railways》 2023年第1期3-12,共10页
The paper summarizes the development of mobile communication of domestic and foreign railways,and proposes the priorities for tackling key technological problems of railway 5G private network according to the technica... The paper summarizes the development of mobile communication of domestic and foreign railways,and proposes the priorities for tackling key technological problems of railway 5G private network according to the technical routes of railway next-generation mobile communication determined by China State Railway Group Co.,Ltd.From the aspects of work objectives,principles,technical routes and innovative working methods,the paper elaborates the ideas of railway 5G scientific and technological research,puts forward the contents and plans of scientific and technological research on railway 5G private network,systematically organizes the achievements in the scientific and technological research stage of railway 5G private network,and sets forth the key contents of next-step scientific and technological research. 展开更多
关键词 railway mobile communication system railway 5G private network tackling key problems in science and technology on 5G private network
下载PDF
A Novel Immune System Model and Its Application to Network Intrusion Detection 被引量:2
7
作者 LingJun CaoYang +1 位作者 YinJian-hua HuangTian-xi 《Wuhan University Journal of Natural Sciences》 CAS 2003年第02A期393-398,共6页
Based on analyzing the techniques and architecture of existing network Intrusion Detection System (IDS), and probing into the fundament of Immune System (IS), a novel immune model is presented and applied to network I... Based on analyzing the techniques and architecture of existing network Intrusion Detection System (IDS), and probing into the fundament of Immune System (IS), a novel immune model is presented and applied to network IDS, which is helpful to design an effective IDS. Besides, this paper suggests a scheme to represent the self profile of network. And an automated self profile extraction algorithm is provided to extract self profile from packets. The experimental results prove validity of the scheme and algorithm, which is the foundation of the immune model. 展开更多
关键词 key words network Intrusion Detection System 5 Immune System self profile automated self profile extraction algorithm
下载PDF
A Distributed Routing and Wavelength Assignment Algorithm for Online Multicast in All-Optical WDM Networks
8
作者 Huang Chuan-he, Chen Xin-meng, Jia Xiao-hua School of Computer, Wuhan University, Wuhan 430072, Hubei, China 《Wuhan University Journal of Natural Sciences》 EI CAS 2002年第1期27-36,共10页
Routing and wavelength assignment for online real-time multicast connection setup is a difficult task due to the dynamic change of availabilities of wavelengths on links and the consideration of wavelength conversion ... Routing and wavelength assignment for online real-time multicast connection setup is a difficult task due to the dynamic change of availabilities of wavelengths on links and the consideration of wavelength conversion delay in WDM networks. This paper presents a distributed routing and wavelength assignment scheme for the setup of real-time multicast connections. It integrates routing and wavelength assignment as a single process, which greatly reduces the connection setup time. The proposed routing method is based on the Prim’s MST (Minimum Spanning Tree) algorithm and the K-restricted breadth-first search method, which can produce a sub-minimal cost tree under a given delay bound. The wave-length assignment uses the least-conversion and load balancing strategies. Simulation results show that the proposed algorithm is suitable for online multicast connection establishment in WDM networks. 展开更多
关键词 key words WDM networks routing and wavelength assignment multicast routing delay bounded routing
下载PDF
OCDMA Network and Key Technology 被引量:2
9
作者 Li Yuquan, Pu Tao, Xu Ming, Yang Shuwen PLA University of Science and Technology, Institute of Communication Engineering, Nanjing, Jiangsu P. R. China,Tel: 86-25-3384990, Fax: 86-25-3384990, Email: proflyq@etang.com Shenzhen University, Advanced Technology Research Centre, Shenzhen, Guangdong, P.R.China 《光学学报》 EI CAS CSCD 北大核心 2003年第S1期721-722,共2页
OCDMA's network application on LAN, metro-ring and backbone networks are discussed. Its simple tell-go protocol makes it a powerful competitor with CSMA/CD in optical LANs. Its large soft capacity could erase the ... OCDMA's network application on LAN, metro-ring and backbone networks are discussed. Its simple tell-go protocol makes it a powerful competitor with CSMA/CD in optical LANs. Its large soft capacity could erase the wavelength routing algorithm of WDM based metro-ring. And its content susceptibility could be largely used in label switching backbone network. And why should be 2D CODEC as well as interference cancellation is although mentioned as OCDMA key technology. 展开更多
关键词 OCDMA network and key Technology BE of AS in LENGTH on WDMA CSMA
原文传递
Cascading attack on trusted-relay quantum key distribution networks 被引量:1
10
作者 Jian Wang Xing-tong Liu 《Communications in Theoretical Physics》 SCIE CAS CSCD 2021年第6期75-79,共5页
Trusted relays are the main state-of-the-art way to realize quantum key distribution networks.However,it is hard to require that all nodes in the network are fully trusted.In a multipath keytransmission mechanism,the ... Trusted relays are the main state-of-the-art way to realize quantum key distribution networks.However,it is hard to require that all nodes in the network are fully trusted.In a multipath keytransmission mechanism,the nodes can be weakly trusted because the secret key can be split into many parts and each part is transmitted to the receiver through a different path.However,if the capacity of a node’s quantum key pool is poorly designed,an attacker,Eve may eavesdrop on the communicating parties’secret message by initiating a redirection attack.In this paper,we show that Eve can trigger a cascading collapse effect by collapsing one of the edges in the network and forcing the communication parties to transmit the message through the nodes controlled by Eve.The influence of the traffic transfer ratio and the control parameters of the edge load on the breakdown probability of the edge are analyzed using a simulation.In order to effectively defend against the cascading attack,it is important for the designer to handle the relationship between the traffic and the capacity of the quantum key pool of each node in the network. 展开更多
关键词 Quantum key distribution Quantum key distribution networks Quantum communications
原文传递
SAC-TA: A Secure Area Based Clustering for Data Aggregation Using Traffic Analysis in WSN 被引量:1
11
作者 Mohanbabu Gopalakrishnan Gopi Saminathan Arumugam +1 位作者 Karthigai Lakshmi Shanmuga Vel 《Circuits and Systems》 2016年第8期1404-1420,共17页
Clustering is the most significant task characterized in Wireless Sensor Networks (WSN) by data aggregation through each Cluster Head (CH). This leads to the reduction in the traffic cost. Due to the deployment of the... Clustering is the most significant task characterized in Wireless Sensor Networks (WSN) by data aggregation through each Cluster Head (CH). This leads to the reduction in the traffic cost. Due to the deployment of the WSN in the remote and hostile environments for the transmission of the sensitive information, the sensor nodes are more prone to the false data injection attacks. To overcome these existing issues and enhance the network security, this paper proposes a Secure Area based Clustering approach for data aggregation using Traffic Analysis (SAC-TA) in WSN. Here, the sensor network is clustered into small clusters, such that each cluster has a CH to manage and gather the information from the normal sensor nodes. The CH is selected based on the predefined time slot, cluster center, and highest residual energy. The gathered data are validated based on the traffic analysis and One-time Key Generation procedures to identify the malicious nodes on the route. It helps to provide a secure data gathering process with improved energy efficiency. The performance of the proposed approach is compared with the existing Secure Data Aggregation Technique (SDAT). The proposed SAC-TA yields lower average energy consumption rate, lower end-to-end delay, higher average residual energy, higher data aggregation accuracy and false data detection rate than the existing technique. 展开更多
关键词 Data Aggregation False Data Injection Attacks Malicious Nodes One-Time key Generation Secure One-Time (SOT) key and Wireless Sensor networks (WSNs)
下载PDF
A Comparative Study of Related Technologies of Intrusion Detection &Prevention Systems
12
作者 Indraneel Mukhopadhyay Mohuya Chakraborty Satyajit Chakrabarti 《Journal of Information Security》 2011年第1期28-38,共11页
The rapid growth of computer networks has changed the prospect of network security. An easy accessibility condition causes computer networks to be vulnerable against numerous and potentially devastating threats from h... The rapid growth of computer networks has changed the prospect of network security. An easy accessibility condition causes computer networks to be vulnerable against numerous and potentially devastating threats from hackers. Up to the moment, researchers have developed Intrusion Detection Systems (IDS) capable of detecting attacks in several available environments. A boundlessness of methods for misuse detection as well as anomaly detection has been applied. Intrusion Prevention Systems (IPS) evolved after that to resolve am-biguities in passive network monitoring by placing detection systems on the line of attack. IPS in other words is IDS that are able to give prevention commands to firewalls and access control changes to routers. IPS can be seen as an improvement upon firewall technologies. It can make access control decisions based on application content, rather than IP address or ports as traditional firewalls do. The next innovation is the combination of IDS and IPS known as Intrusion Detection and Prevention Systems (IDPS) capable of de-tecting and preventing attacks from happening. This paper presents an overview of IDPS followed by their classifications and applications. A new signature based IDPS architecture named HawkEye Solutions has been proposed by the authors. Authors have presented the basic building blocks of the IDS, which include mechanisms for carrying out TCP port scans, Traceroute scan, ping scan and packet sniffing to monitor net-work health detect various types of attacks. Real time implementation results of the system have been pre-sented. Finally a comparative analysis of various existing IDS/IPS solutions with HawkEye Solutions em-phasizes its significance. 展开更多
关键词 ADVANCES of network Security INTRUSION Detection SYSTEM INTRUSION PREVENTION SYSTEM Haw-keye Solutions
下载PDF
Context-Aware Adaptive Routing for Opportunistic Network 被引量:1
13
作者 WANG Xiaomao HUANG Chuanhe +3 位作者 ZHOU Hao SHI Jiaoli HE Kai DAN Feng 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2015年第4期299-306,共8页
Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encountered nodes offers a new mechanism for exploiting the mobile devices that many users already carry. However, forwardin... Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encountered nodes offers a new mechanism for exploiting the mobile devices that many users already carry. However, forwarding messages in such a network is trapped by many particular challenges, and some protocols have contributed to solve them partly. In this paper, we propose a Context-Aware Adaptive opportunistic Routing algorithm(CAAR). The algorithm firstly predicts the approximate location and orientation of the destination node by using its movement key positions and historical communication records, and then calculates the best neighbor for the next hop by using location and velocity of neighbors. In the unpredictable cases, forwarding messages will be delivered to the more capable forwarding nodes or wait for another transmission while the capable node does not exist in the neighborhood. The proposed algorithm takes the movement pattern into consideration and can adapt different network topologies and movements. The experiment results show that the proposed routing algorithm outperforms the epidemic forwarding(EF) and the prophet forwarding(PF) in packet delivery ratio while ensuring low bandwidth overhead. 展开更多
关键词 routing algorithm context-aware opportunistic network movement key position
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部