期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
光纤通信网络窃听方法与防御对策研究 被引量:2
1
作者 牛帅 《中国新通信》 2019年第23期19-19,共1页
光纤通信网络是通信行业在发展过程中非常重要的一部分,会直接影响到通信行业的发展成效。本文针对光纤通信网络窃听方法进行分析,并且结合实际情况,提出有针对性的防御对策,为光纤通信网络的安全性和稳定性提供有效保障。
关键词 光纤通信 网络窃听 窃听方法 防御对策
在线阅读 下载PDF
防窃听数据链路安全协议的设计与实现
2
作者 毛席龙 蔡标 冯超 《现代电子技术》 2010年第21期86-88,99,共4页
无论是软件捕包技术还是硬件捕包技术,前提是建立网络连接,恢复正确的时钟和数据流。针对网络窃听技术,提出并实现了可安全传输的数据链路协议,包括时钟协议和加密协议。协议采用插入式结构,不改变网络拓扑结构和驱动软件,易于扩展,可... 无论是软件捕包技术还是硬件捕包技术,前提是建立网络连接,恢复正确的时钟和数据流。针对网络窃听技术,提出并实现了可安全传输的数据链路协议,包括时钟协议和加密协议。协议采用插入式结构,不改变网络拓扑结构和驱动软件,易于扩展,可以适应不同层次、不同速率和不同介质的以太网物理层器件。协议单元可组合使用,在用户端和交换机端都易于实现。 展开更多
关键词 网络窃听 链路协议 AES算法 时钟协议 加密协议
在线阅读 下载PDF
基于网络编码保密通信 被引量:4
3
作者 曹张华 唐元生 《通信学报》 EI CSCD 北大核心 2010年第S1期188-194,共7页
通过分析应用网络编码进行通信时,网络中的消息数据被混合这一事实,给出了2种基于网络编码的保密通信方案。其中,方案1是完全利用网络编码来实现完善保密通信的,即信源消息数据在传输过程中未使用密钥加密,这是与密码学方法的一个根本区... 通过分析应用网络编码进行通信时,网络中的消息数据被混合这一事实,给出了2种基于网络编码的保密通信方案。其中,方案1是完全利用网络编码来实现完善保密通信的,即信源消息数据在传输过程中未使用密钥加密,这是与密码学方法的一个根本区别;方案2是结合网络编码和密码学方法实现保密通信的,其安全性由网络编码和密码学方法共同保证。因此,所提出的保密通信方案表明安全性是网络编码的一种固有性质,而且,与已有的方法相比,给出的方法能完全有效地利用网络容量。 展开更多
关键词 网络编码 信息安全 组播 容量 窃听网络
在线阅读 下载PDF
Resource Allocation for Physical Layer Security in Heterogeneous Network with Hidden Eavesdropper 被引量:5
4
作者 GONG Shiqi XING Chengwen +1 位作者 FEI Zesong KUANG Jingming 《China Communications》 SCIE CSCD 2016年第3期82-95,共14页
The tremendous performance gain of heterogeneous networks(Het Nets) is at the cost of complicated resource allocation. Considering information security, the resource allocation for Het Nets becomes much more challengi... The tremendous performance gain of heterogeneous networks(Het Nets) is at the cost of complicated resource allocation. Considering information security, the resource allocation for Het Nets becomes much more challenging and this is the focus of this paper. In this paper, the eavesdropper is hidden from the macro base stations. To relax the unpractical assumption on the channel state information on eavesdropper, a localization based algorithm is first given. Then a joint resource allocation algorithm is proposed in our work, which simultaneously considers physical layer security, cross-tier interference and joint optimization of power and subcarriers under fairness requirements. It is revealed in our work that the considered optimization problem can be efficiently solved relying on convex optimization theory and the Lagrangian dual decomposition method is exploited to solve the considered problem effectively. Moreover, in each iteration the closed-form optimal resource allocation solutions can be obtained based on the Karush-Kuhn-Tucker(KKT) conditions. Finally, the simulation results are given to show the performance advantages of the proposed algorithm. 展开更多
关键词 resource allocation physical layer security heterogeneous networks RSS-based location estimation lagrangian dual decomposition
在线阅读 下载PDF
An Anti-Eavesdrop Transmission Scheduling Scheme Based on Maximizing Secrecy Outage Probability in Ad Hoc Networks 被引量:1
5
作者 WANG Yajun LIAO Tongqing WANG Chuanan 《China Communications》 SCIE CSCD 2016年第1期176-184,共9页
In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their transmissions.We propose an optim... In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their transmissions.We propose an optimal transmission scheduling scheme to defend against the eavesdropper,where a source node having the highest secrecy rate is scheduled to access the wireless medium for transmitting to its destination in an opportunistic manner.To be specific,the secrecy rate between a pair of the source and destination in the presence of an eavesdropper varies temporally due to the wireless fading effect.The proposed optimal transmission scheduling scheme opportunistically selects a source node with the highest secrecy rate to transmit its data for the sake of maximizing the security of the ad hoc network against eavesdropping attacks.For comparison purposes,we also consider the conventional round-robin scheduling as a benchmark,where multiple source nodes take turns in accessing their shared wireless medium for transmitting to their respective destinations.We derive closed-form secrecy outage probability expressions of both the round-robin scheduling and the proposed optimal scheduling schemes over Rayleigh fading environments.Numerical results show that the proposed transmission scheduling scheme outperforms the conventional round-robin method in terms of its secrecy outage probability.Additionally,upon increasing the number of source-destination pairs,the secrecy outage probability of the round-robin scheme keeps unchanged,whereas the secrecy outage performance of the proposed transmission scheduling significantly improves,showing the security benefits of exploiting transmission scheduling for protecting wireless ad hoc networks against eavesdropping. 展开更多
关键词 transmission scheduling eavesdropping secrecy outage probability secrecy rate rayleigh fading
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部