首页> 外文OA文献 >Access control and availability aspects using wireless solutions based on IEEE 802.11 technologies, providing access to classified networks
【2h】

Access control and availability aspects using wireless solutions based on IEEE 802.11 technologies, providing access to classified networks

机译:使用基于IEEE 802.11技术的无线解决方案的访问控制和可用性方面,提供对保密网络的访问

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Wireless networking is among the fastest growing trends in technology. For militaryobjectives wireless networks are effective and flexible ways of communicating, and importantelements in operating quick, accurate and independent. Over the last year’s commercialtechnology, based on the wireless IEEE 802.11 standard has grown to be low-cost productsoffering cheap and easy ways to establish rapid communication services. For all that, lackingelements of security, increased availability, weak mechanisms and capabilities in order toprotect and safeguard private wireless networking, concerns costumers which require highassurance communication facilities. To comply with physical security, high-end wirelesssecurity requirements and protection mechanisms are required to fully ensure the wirelessenvironment and control the enterprise. Wireless networks has not been considered secureenough to be implemented as part of high assurance communication systems which haveaccess to classified information networks. This thesis considers security aspects of wirelessnetworking related to access control and availability, which means that a wide range ofsecurity issues will be discussed. Based on availability, the thesis will focus on requirementsand mechanisms related to authentication, confidentiality, integrity and authenticity.The thesis has indicated through two problem scenarios that high-end requirements signifiescomplexity and that security mechanisms must be implemented through adoption andadjustment of the available security protocols IEEE 802.1X and IEEE 802.11i. Still, the thesishas shown that security protocols such as IEEE 802.1X and 802.11i does not solve all securityproblems. Additional wireless protection systems are required to supervise and control statesecurity in order to protect the wireless network environment. In addition, network-layersecurity is required to oblige end-to-end security control. The conclusion brings security inwireless network into comprehensive challenges that require fully control to analyze data andoperations to consolidate the wireless environment.Considering wireless protection systems which operate as integrated parts of high assurancewireless system, the thesis has investigated mechanisms and ways to actively protect thewireless network environment. The thesis has shown that wireless monitor and honeypotnetworks introduce potential solutions to meet availability aspects in turns of automaticdetection, protection and prevention
机译:无线网络是技术发展最快的趋势之一。对于军事目标而言,无线网络是有效且灵活的通信方式,并且是快速,准确和独立运行的重要要素。在过去的一年中,基于无线IEEE 802.11标准的商业技术已经发展成为一种低成本产品,提供了建立快速通信服务的廉价,简便方法。尽管如此,缺乏保护和保护私有无线网络的安全性,增加的可用性,较弱的机制和功能的关注,使服装商需要高保证的通信设施。为了符合物理安全性,需要高端无线安全性要求和保护机制来充分确保无线环境并控制企业。无线网络还没有被认为足够安全地实现为可以访问机密信息网络的高可靠性通信系统的一部分。本文考虑了与访问控制和可用性有关的无线网络安全方面,这意味着将讨论广泛的安全问题。本文基于可用性,着重于与身份验证,机密性,完整性和真实性相关的需求和机制。本文通过两个问题场景表明,高端需求意味着复杂性,并且必须通过采用和调整可用的安全协议来实现安全机制。 IEEE 802.1X和IEEE 802.11i。尽管如此,论文仍显示诸如IEEE 802.1X和802.11i之类的安全协议并不能解决所有安全问题。为了保护无线网络环境,需要附加的无线保护系统来监督和控制状态安全性。另外,要求网络层安全性以强制进行端到端安全性控制。该结论将无线安全网络带入了全面挑战,需要全面控制以分析数据和操作,以巩固无线环境。考虑到作为高安全性无线系统的集成部分而运行的无线保护系统,本文研究了积极保护无线网络环境的机制和方法。 。论文表明,无线监控器和蜜罐网络引入了潜在的解决方案,可以在自动检测,保护和预防方面满足可用性方面的要求。

著录项

  • 作者

    Borgi Tor Kristian;

  • 作者单位
  • 年度 2007
  • 总页数
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号