期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Key Technologies of 3G WCDMA Network Sharing
1
作者 Zhang Jian (Mobile Division of ZTE Corporation, Shanghai 201203, China) 《ZTE Communications》 2005年第2期5-8,共4页
Based on the latest research findings of 3GPP on network sharing, this paper introduces 4 solutions to WCDMA 3G network sharing: site sharing, common network sharing, geographically split network sharing, and radio ac... Based on the latest research findings of 3GPP on network sharing, this paper introduces 4 solutions to WCDMA 3G network sharing: site sharing, common network sharing, geographically split network sharing, and radio access network sharing. It also analyzes the key network sharing technologies, including the lu-Flex function in Release 5, the UTRAN sharing mechanism in the connected mode in Release 5 and the mechanism of network sharing support enhancement in Release 6. 展开更多
关键词 WCDMA SGSN UTRAN PLMN key Technologies of 3G WCDMA Network Sharing
下载PDF
An Effective Secure MAC Protocol for Cognitive Radio Networks
2
作者 Bayan Al-Amri Gofran Sami Wajdi Alhakami 《Computer Systems Science & Engineering》 SCIE EI 2022年第7期133-148,共16页
The vast revolution in networking is increasing rapidly along with tech-nology advancements,which requires more effort from all cyberspace profes-sionals to cope with the challenges that come with advanced technology ... The vast revolution in networking is increasing rapidly along with tech-nology advancements,which requires more effort from all cyberspace profes-sionals to cope with the challenges that come with advanced technology privileges and services.Hence,Cognitive Radio Network is one of the promising approaches that permit a dynamic type of smart network for improving the utili-zation of idle spectrum portions of wireless communications.However,it is vul-nerable to security threats and attacks and demands security mechanisms to preserve and protect the cognitive radio networks for ensuring a secure commu-nication environment.This paper presents an effective secure MAC protocol for cognitive radio networks,significantly enhancing the security level of the existing DSMCRN and SSMCRN protocols by eliminating the authentication server’s necessity,which can be a single point of failure to compromise the entire network communication.The proposed protocol has proven to be effective and reliable since it does not rely on a centralized entity for providing the required security for a single pair of cognitive users.The protocol also improves the performance in the context of fast switching to data channels leading to higher throughput is achieved compared to the benchmark protocols. 展开更多
关键词 Cognitive radio networks shared key AUTHENTICATION elliptic curve cryptography THROUGHPUT
下载PDF
无限云网络可靠性建设:一种新的健壮且节能的网络拓扑控制方法(英文)
3
作者 William Liu 《China Communications》 SCIE CSCD 2011年第6期1-10,共10页
The future Wireless Cloud Networks (WCNs) are required to satisfy both extremely high levels of service resilience and security assurance (i.e., Blue criteria) by overproviding backup network resources and cryptograph... The future Wireless Cloud Networks (WCNs) are required to satisfy both extremely high levels of service resilience and security assurance (i.e., Blue criteria) by overproviding backup network resources and cryptographic protection on wireless communication respectively, as well as minimizing energy consumption (i.e., Green criteria) by switching off unnecessary resources as much as possible. There is a contradiction to satisfy both Blue and Green design criteria simultaneously. In this paper, we propose a new BlueGreen topological control scheme to leverage the wireless link connectivity for WCNs using an adaptive encryption key allocation mechanism, named as Shared Backup Path Keys (SBPK). The BlueGreen SBPK can take into account the network dependable requirements such as service resilience, security assurance and energy efficiency as a whole, so as trading off between them to find an optimal solution. Actually, this challenging problem can be modeled as a global optimization problem, where the network working and backup elements such as nodes, links, encryption keys and their energy consumption are considered as a resource, and their utilization should be minimized. The case studies confirm that there is a trade-off optimal solution between the capacity efficiency and energy efficiency to achieve the dependable WCNs. 展开更多
关键词 wireless cloud networking service resilience security assurance energy efficiecy BlueGreen shared backup path keys
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部