期刊文献+
共找到41篇文章
< 1 2 3 >
每页显示 20 50 100
Security Analysis of Application Layer Protocols on Wireless Local Area Networks 被引量:1
1
作者 杨明豪 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第5期586-592,共7页
This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries l... This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries launch deauthentication flood attacks cutting users' connection, the connection managers will automatically research the last access point's extended service set identifier (ESSID) and then re-establish connection. However, such re-connection can lead the users to a fake access point with the same ESSID set by attackers. As the attackers hide behind users' access points, they can pass AL's authentication and security schemes, e.g. secure socket layer (SSL). We have proved that they can even spy on users' account details, passwords, data and privacy. 展开更多
关键词 man-in-the-middle (MITM) attacks session hijacking wireless local area network (WLAN)
原文传递
Application of Wireless Local Area Network Technology in Mobile Robot for Finned Tube Inspection
2
作者 王光荣 马培荪 +2 位作者 曹曦 孙红 李彦明 《Journal of Shanghai University(English Edition)》 CAS 2004年第2期180-186,共7页
This paper introduces a novel robot for outer surface inspection of boiler tubes. The paper describes the hardware system, wireless communication strategy, communication procedure and system software of the robot. The... This paper introduces a novel robot for outer surface inspection of boiler tubes. The paper describes the hardware system, wireless communication strategy, communication procedure and system software of the robot. The WLAN technology is used in the robot. It solves the problem of shielding generated by iron boiler and 11Mbps bandwidth made it possible for video and control stream real-time transmit within the same channel. Though TCP/IP protocol is robust, serial server is a transparent channel but cannot detect error and retransmit the data. In order to improve the reliability of serial communication, a new communication protocol is proposed. Key words boiler tubes - mobile robotics - wireless local area network Project Supported by the National High-Tech Program (Grant No. 2002AA420080) 展开更多
关键词 boiler tubes mobile robotics wireless local area network
下载PDF
Research on the Teaching Reform of "Wireless Local Area Network" in the Background of"Wireless Business Circle"
3
作者 Feng Zhang 《International Journal of Technology Management》 2017年第4期74-76,共3页
This paper proposes the teaching reform of the "Wireless Local Area Network" in the background of "Wireless Business Circle" . At present, WLAN technology is becoming more and more mature, the application is then ... This paper proposes the teaching reform of the "Wireless Local Area Network" in the background of "Wireless Business Circle" . At present, WLAN technology is becoming more and more mature, the application is then becoming more and more extensive, the campus network will grow rapidly on wireless LAN applications especially the research and higher education institutions on the wireless LAN demand is increasing with wireless LAN will have a very broad market development space. GIS business circle analysis model is to determine business enterprise location or expand their existing business outlets of information necessary to say on the map by G1S visual function of the model. This paper makes the combination of the mentioned items that will then and later influence the performance of the model. 展开更多
关键词 Teaching Reform wireless local area Network wireless Business Circle.
下载PDF
Energy efficiency aware dynamic rate and power adaptation in carrier sensing based WLANs under Rayleigh fading and shadowing
4
作者 Md.Forkan Uddin 《Digital Communications and Networks》 SCIE CSCD 2024年第4期918-933,共16页
We consider the problem of energy efficiency aware dynamic adaptation of data transmission rate and transmission power of the users in carrier sensing based Wireless Local Area Networks(WLANs)in the presence of path l... We consider the problem of energy efficiency aware dynamic adaptation of data transmission rate and transmission power of the users in carrier sensing based Wireless Local Area Networks(WLANs)in the presence of path loss,Rayleigh fading and log-normal shadowing.For a data packet transmission,we formulate an optimization problem,solve the problem,and propose a rate and transmission power adaptation scheme with a restriction methodology of data packet transmission for achieving the optimal energy efficiency.In the restriction methodology of data packet transmission,a user does not transmit a data packet if the instantaneous channel gain of the user is lower than a threshold.To evaluate the performance of the proposed scheme,we develop analytical models for computing the throughput and energy efficiency of WLANs under the proposed scheme considering a saturation traffic condition.We then validate the analytical models via simulation.We find that the proposed scheme provides better throughput and energy efficiency with acceptable throughput fairness if the restriction methodology of data packet transmission is included.By means of the analytical models and simulations,we demonstrate that the proposed scheme provides significantly higher throughput,energy efficiency and fairness index than a traditional non-adaptive scheme and an existing most relevant adaptive scheme.Throughput and energy efficiency gains obtained by the proposed scheme with respect to the existing adapting scheme are about 75%and 103%,respectively,for a fairness index of 0.8.We also study the effect of various system parameters on throughput and energy efficiency and provide various engineering insights. 展开更多
关键词 Carrier sense multiple access Energy efficiency Fading and shadowing Rate and power adaptation THROUGHPUT wireless local area networks
下载PDF
Domain adaptive methods for device diversity in indoor localization 被引量:1
5
作者 Liu Jing Liu Nan +1 位作者 Pan Zhiwen You Xiaohu 《Journal of Southeast University(English Edition)》 EI CAS 2019年第4期424-430,共7页
To solve the problem of variations in radio frequency characteristics among different devices,transfer learning is applied to transform device diversity to domain adaptation in the indoor localization algorithm.A robu... To solve the problem of variations in radio frequency characteristics among different devices,transfer learning is applied to transform device diversity to domain adaptation in the indoor localization algorithm.A robust indoor localization algorithm based on the aligned fingerprints and ensemble learning called correlation alignment for localization(CALoc)is proposed with low computational complexity.The second-order statistical properties of fingerprints in the offline and online phase are needed to be aligned.The real-time online calibration method mitigates the impact of device heterogeneity largely.Without any time-consuming deep learning retraining process,CALoc online only needs 0.11 s.The effectiveness and efficiency of CALoc are verified by realistic experiments.The results show that compared to the traditional algorithms,a significant performance gain is achieved and that it achieves better positioning accuracy with a 19%improvement. 展开更多
关键词 wireless local area networks indoor localization fingerprinting device diversity transfer learning correlation alignment
下载PDF
A Semi-Supervised WLAN Indoor Localization Method Based on l1-Graph Algorithm 被引量:1
6
作者 Liye Zhang Lin Ma Yubin Xu 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2015年第4期55-61,共7页
For indoor location estimation based on received signal strength( RSS) in wireless local area networks( WLAN),in order to reduce the influence of noise on the positioning accuracy,a large number of RSS should be colle... For indoor location estimation based on received signal strength( RSS) in wireless local area networks( WLAN),in order to reduce the influence of noise on the positioning accuracy,a large number of RSS should be collected in offline phase. Therefore,collecting training data with positioning information is time consuming which becomes the bottleneck of WLAN indoor localization. In this paper,the traditional semisupervised learning method based on k-NN and ε-NN graph for reducing collection workload of offline phase are analyzed,and the result shows that the k-NN or ε-NN graph are sensitive to data noise,which limit the performance of semi-supervised learning WLAN indoor localization system. Aiming at the above problem,it proposes a l1-graph-algorithm-based semi-supervised learning( LG-SSL) indoor localization method in which the graph is built by l1-norm algorithm. In our system,it firstly labels the unlabeled data using LG-SSL and labeled data to build the Radio Map in offline training phase,and then uses LG-SSL to estimate user's location in online phase. Extensive experimental results show that,benefit from the robustness to noise and sparsity ofl1-graph,LG-SSL exhibits superior performance by effectively reducing the collection workload in offline phase and improving localization accuracy in online phase. 展开更多
关键词 indoor location estimation l1-graph algorithm semi-supervised learning wireless local area networks(WLAN)
下载PDF
Radio map updated method based on subscriber locations in indoor WLAN localization 被引量:1
7
作者 Ying Xia Zhongzhao Zhang Lin Ma 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2015年第6期1202-1209,共8页
With the rapid development of wireless local area network (WLAN) technology, an important target of indoor positioning systems is to improve the positioning accuracy while reducing the online calibration effort to o... With the rapid development of wireless local area network (WLAN) technology, an important target of indoor positioning systems is to improve the positioning accuracy while reducing the online calibration effort to overcome signal time-varying. A novel fingerprint positioning algorithm, known as the adaptive radio map with updated method based on hidden Markov model (HMM), is proposed. It is shown that by using a collection of user traces that can be cheaply obtained, the proposed algorithm can take advantage of these data to update the labeled calibration data to further improve the position estimation accuracy. This algorithm is a combination of machine learning, information gain theory and fingerprinting. By collecting data and testing the algorithm in a realistic indoor WLAN environment, the experiment results indicate that, compared with the widely used K nearest neighbor algorithm, the proposed algorithm can improve the positioning accuracy while greatly reduce the calibration effort. 展开更多
关键词 subscriber location wireless local area network(WLAN) positioning accuracy calibration effort hidden Markovmodel (HMM).
下载PDF
A PHEMT Based Wideband LNA for Wireless Applications 被引量:2
8
作者 Muhammad Saad Khan ZHANG Hongxin +2 位作者 HE Pengfei Sulman Shahzad Rahat Ullah 《China Communications》 SCIE CSCD 2015年第10期108-116,共9页
This work is about the development of a super low noise amplifier with minimum power consumption and high gain for several wireless applications.The amplifier operates at frequency bands of 0.9-2.4 GHz and can be used... This work is about the development of a super low noise amplifier with minimum power consumption and high gain for several wireless applications.The amplifier operates at frequency bands of 0.9-2.4 GHz and can be used in many applications like Wireless local area network(WLAN),WiFi,Bluetooth,ZigBee and Global System for mobile communications(GSM).This new design can be employed for the IEEE 802.15.4 standard in industrial,scientific and medical(ISM) Band.The enhancement mode pseudomorphic high electron mobility transistor PHEMT is used here due to its high linearity,better performance and less noisy operation.The common source inductive degeneration method is employed here to enhance the gain of amplifier.The amplifier produces a gain of more than 17 dB and noise figure of about 0.5 dB.The lower values of S11 and S22 reflect the accuracy of impedance matching network placed at the input and output sides of amplifier.Agilent Advance Design System(ADS) is used for the design and simulation purpose.Further the layout of design is developed on the FR4 substrate. 展开更多
关键词 low noise amplifier phemt advanced design system wireless local area network global positioning system
下载PDF
Adaptive rate control on wireless transcoder
9
作者 Chen Xudong Zhu Qingxin Liao Yong Fu Qingyun Xiong Guangze 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第3期633-640,共8页
To guarantee the real-time transmission of a video stream, based on the stochastic optimal control method, a frame layer adaptive rate control algorithm for the wireless transcoder is proposed, which is capable of dyn... To guarantee the real-time transmission of a video stream, based on the stochastic optimal control method, a frame layer adaptive rate control algorithm for the wireless transcoder is proposed, which is capable of dynamically determining the transcoder's objective bit rate, according to the bandwidth variation of the wireless channel and the buffer occupancy. Then the transient performance, steady performance, and computational complexity of the algorithm are analyzed. Finally, the experiment results demonstrate that the algorithm can improve the synthetic performance of rate control through the compromise between the end-to-end delay and the playout quality. 展开更多
关键词 streaming media rate control transcoder wireless local area network H.264/AVC.
下载PDF
A NOVEL LINK ADAPTATION SCHEME TO ENHANCE PERFORMANCE OF IEEE 802.11G WIRELESS LAN
10
作者 Chen Liquan HuAiqun 《Journal of Electronics(China)》 2006年第3期350-354,共5页
A novel link adaptation scheme using linear Auto Regressive (AR) model channel estimation algorithm to enhance the performance of auto rate selection mechanism in IEEE 802.11g is proposed. This scheme can overcome t... A novel link adaptation scheme using linear Auto Regressive (AR) model channel estimation algorithm to enhance the performance of auto rate selection mechanism in IEEE 802.11g is proposed. This scheme can overcome the low efficiency caused by time interval between the time when Received Signal Strength (RSS) is measured and the time when rate is selected. The best rate is selected based on data payload length, frame retry count and the estimated RSS, which is estimated from recorded RSSs. Simulation results show that the proposed scheme enhances mean throughput performance up to 7%, in saturation state, and up to 24% in finite load state compared with those non-estimation schemes, performance enhancements in average drop rate and average number of transmission attempts per data frame delivery also validate the effectiveness of the proposed schelne. 展开更多
关键词 wireless local area Network (WLAN) Link adaptation Channel estimation Auto rate selection Received Signal Strength (RSS)
下载PDF
Multiusers Parallel Competitive Channel Protocol Based on Unsaturated Service
11
作者 Yong Li Miao Gao +4 位作者 Xin Xu Guang Zheng Hongbo Qiao Xinming Ma Ping Dong 《China Communications》 SCIE CSCD 2023年第9期96-114,共19页
In order to enhance the area throughput of next generation wireless local area network(WLAN)in high density scenarios,orthogonal frequency division multiple access(OFDMA)has been adopted as one of the key technologies... In order to enhance the area throughput of next generation wireless local area network(WLAN)in high density scenarios,orthogonal frequency division multiple access(OFDMA)has been adopted as one of the key technologies in the next generation WLAN communication standards.However,the performance of the existing media access control(MAC)degrades significantly under unsaturated services.Therefore,this paper proposes a multi-user parallel contention channel MAC(MU-MAC)based on unsaturated services,which can effectively reduce the channel access conflict and improve the OFDMA access efficiency of cluster member nodes.On this basis,MU-MAC is enhanced for the spatial clustering group(SCG)formation protocol and support for the unsaturated service characteristics.Further,the optimal access radius when the service is in a non-saturated state is analyzed to make the relevant theoretical analysis more generally,and the expressions for the throughput and area throughput of the proposed protocol are modeled and derived.The simulation results verify the correctness of the theoretical analysis and the efficiency of the protocol performance.The results show that MU-MAC outperforms IEEE 802.11ax and OMAX protocol in area throughput by 40.72%and 104.15%,respectively. 展开更多
关键词 wireless local area network high density deployment scenarios unsaturated services spatial clustering group
下载PDF
Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network
12
作者 Abdallah Elhigazi Abdallah Mosab Hamdan +6 位作者 Shukor Abd Razak Fuad A.Ghalib Muzaffar Hamzah Suleman Khan Siddiq Ahmed Babikir Ali Mutaz H.H.Khairi Sayeed Salih 《Computers, Materials & Continua》 SCIE EI 2023年第3期5607-5623,共17页
IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local ... IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local area network(WLAN)through radio waves,its communication is exposed to the possibility of being attacked by illegitimate users.Moreover,the security design of the wireless structure is vulnerable to versatile attacks.For example,the attacker can imitate genuine features,rendering classificationbased methods inaccurate in differentiating between real and false messages.Althoughmany security standards have been proposed over the last decades to overcome many wireless network attacks,effectively detecting such attacks is crucial in today’s real-world applications.This paper presents a novel resource exhaustion attack detection scheme(READS)to detect resource exhaustion attacks effectively.The proposed scheme can differentiate between the genuine and fake management frames in the early stages of the attack such that access points can effectively mitigate the consequences of the attack.The scheme is built through learning from clustered samples using artificial neural networks to identify the genuine and rogue resource exhaustion management frames effectively and efficiently in theWLAN.The proposed scheme consists of four modules whichmake it capable to alleviates the attack impact more effectively than the related work.The experimental results show the effectiveness of the proposed technique by gaining an 89.11%improvement compared to the existing works in terms of detection. 展开更多
关键词 802.11 media access control(MAC) wireless local area network(WLAN) artificial neural network denial-of-service(DoS)
下载PDF
Security analysis of newly ameliorated WAPI protocol 被引量:3
13
作者 庞辽军 李慧贤 王育民 《Journal of Southeast University(English Edition)》 EI CAS 2008年第1期25-28,共4页
Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is ... Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is analyzed with the CK (Canetti-Krawczyk) model and the BAN (Burrows-Abadi- Needham) logic. Results show that it can achieve the alleged authentication and key negotiation goals. Besides those alleged, further analyses indicate that the authentication access process can satisfy other security requirements, such as mutual identity authentication, mutual key control, key confirmation, message integrity check, etc. If the used elliptic curve encryption algorithm and the hash algorithm are secure enough, the protocol can efficiently realize mutual authentication between STAs (station) and APs (access point). Therefore, WAPI can be applied to replace the security mechanism used in the original WLAN international standard to enhance its security. 展开更多
关键词 wireless local area network (WLAN) WLAN authentication and privacy infrastructure (WAPI) AUTHENTICATION key negotiation CK model
下载PDF
MODIFIED ULTRA WIDEBAND CIRCULAR PRINTED MONOPOLE ANTENNA 被引量:4
14
作者 何小祥 邓宏伟 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第3期214-218,共5页
A simple and compact microstrip-fed ultra wideband (UWB) printed monopole antenna is presented. The antenna is composed of a circular radiator and a finitely grounded plane. The antenna occupies about 16.62 GHz abso... A simple and compact microstrip-fed ultra wideband (UWB) printed monopole antenna is presented. The antenna is composed of a circular radiator and a finitely grounded plane. The antenna occupies about 16.62 GHz absolute bandwidth and 142.7% relative bandwidth covering from 3.38 GHz to 20 GHz with voltage standing wave ratio (VSWR) below two. A quasi-omnidirectional and quasi-symmetrical radiation pattern in H plane is obtained in the whole bandwidth. The high performance of the antenna is validated with measured and simulated results given. The antenna can be applied for the system design of UWB wireless communication. 展开更多
关键词 microstrip antennas wireless local area network (WLAN) mobile antennas ultra wideband(UWB) printed antenna
下载PDF
A KNN-based two-step fuzzy clustering weighted algorithm for WLAN indoor positioning 被引量:3
15
作者 Xu Yubin Sun Yongliang Ma Lin 《High Technology Letters》 EI CAS 2011年第3期223-229,共7页
Although k-nearest neighbors (KNN) is a popular fingerprint match algorithm for its simplicity and accuracy, because it is sensitive to the circumstances, a fuzzy c-means (FCM) clustering algorithm is applied to i... Although k-nearest neighbors (KNN) is a popular fingerprint match algorithm for its simplicity and accuracy, because it is sensitive to the circumstances, a fuzzy c-means (FCM) clustering algorithm is applied to improve it. Thus, a KNN-based two-step FCM weighted (KTFW) algorithm for indoor positioning in wireless local area networks (WLAN) is presented in this paper. In KTFW algorithm, k reference points (RPs) chosen by KNN are clustered through FCM based on received signal strength (RSS) and location coordinates. The right clusters are chosen according to rules, so three sets of RPs are formed including the set of k RPs chosen by KNN and are given different weights. RPs supposed to have better contribution to positioning accuracy are given larger weights to improve the positioning accuracy. Simulation results indicate that KTFW generally outperforms KNN and its complexity is greatly reduced through providing initial clustering centers for FCM. 展开更多
关键词 wireless local area networks (WLAN) indoor positioning k-nearest neighbors (KNN) fuzzy c-means (FCM) clustering center
下载PDF
A shock wave overpressure test system based on WLAN 被引量:1
16
作者 张晋文 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2015年第1期30-35,共6页
Due to short transmission distance and low transmission speed when testing the shock wave overpressure with storage test method based on ZigBee technology, a new test method based on wireless local area network (WLAN... Due to short transmission distance and low transmission speed when testing the shock wave overpressure with storage test method based on ZigBee technology, a new test method based on wireless local area network (WLAN) technology is proposed, which can monitor remote test nodes. Moreover, the wireless network is designed based on 802. 11b/g protocol, which is helpful for reading the data of the test nodes quickly. Therefore, the accessibility of distributed test system can be improved greatly. The field test results show that the test system performance is good and the transmission speed is high. 展开更多
关键词 explosion field wireless local area network (WLAN) wireless transmission
下载PDF
A random adaptive method to adjust MAC parameters in IEEE802.11e WLAN
17
作者 王建新 MAKFILE S 李婧 《Journal of Central South University》 SCIE EI CAS 2009年第4期629-634,共6页
The IEEE 802.11e standard is proposed to provide QoS support in WLAN by providing prioritized differentiation of traffic. Since all the stations in the same priority access category (AC) have the same set of parameter... The IEEE 802.11e standard is proposed to provide QoS support in WLAN by providing prioritized differentiation of traffic. Since all the stations in the same priority access category (AC) have the same set of parameters, when the number of stations increases, the probability of different stations in the same AC choosing the same values will increase, which will result in collisions. Random adaptive MAC (medium access control) parameters scheme (RAMPS) is proposed, which uses random adaptive MAC differentiation parameters instead of the static ones used in the 802.11e standard. The performance of RAMPS is compared with that of enhanced distributed coordination access (EDCA) using NS2. The results show that RAMPS can reduce collision rate of the AC and improve the throughput by using adaptive random contention window size and inter-frame spacing values. RAMPS ensures that at any given time, several flows of the same priority have different MAC parameter values. By using the random offset for the inter-frame spacing value and the backoff time, RAMPS can provide intra-AC differentiation. The simulation results show that RAMPS outperforms EDCA in terms of both throughput and end-to-end delay irrespective of the traffic load. 展开更多
关键词 wireless local area networks (WLAN) IEEE 802.11 e QoS medium access control (MAC)
下载PDF
Improved MIMO-OFDM scheme for the next generation WLAN
18
作者 Zhanji Wu Xiang Gao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2013年第1期52-59,共8页
The research and application of wireless local area networks (WLAN) technology are in a stage of rapid development. It has been one of research focuses of the wireless communications field. Through the use of enhanc... The research and application of wireless local area networks (WLAN) technology are in a stage of rapid development. It has been one of research focuses of the wireless communications field. Through the use of enhanced single-user (SU)/multi-user (MU) multiple input multiple output (MIMO)-orthogonal frequency division multiplexing (OFDM) technology, the next generation WLAN IEEE 802.1 lac dramatically increases the throughput. An improved MIMO-OFDM scheme based on modulation diversity is proposed for the next generation WLAN. It uses two-dimensional modulation diversity to the current IEEE 802.11ac transmission scheme. Through the space-time-frequency component inter- leaver and the rotational modulation, the proposed scheme ex- hibits high spectral efficiency and low error rate in fading channels. The simulation results show that the proposed scheme significantly outperforms the SU/MU MIMO-OFDM scheme in the current IEEE 802.11 ac standard, which is up to 5 dB. 展开更多
关键词 wireless local area networks (WLAN) I EEE 802.1 lac modulation diversity multiple input multiple output (MIMO) orthog- onal frequency division multiplexing (OFDM).
下载PDF
Mathematical Analysis of Energy Efficiency in IEEE 802.11 DCF
19
作者 高波 杨宇航 马惠业 《Transactions of Tianjin University》 EI CAS 2005年第5期332-337,共6页
The standardized IEEE ,802. II distributed coordination function ( DCF) provides a contention-based distributed channel access mechanism for mobile stations to share the wireless medium. However, when stations are m... The standardized IEEE ,802. II distributed coordination function ( DCF) provides a contention-based distributed channel access mechanism for mobile stations to share the wireless medium. However, when stations are mobile or portable units, power consumption becomes a primary issue since terminals are usually battery driven. This paper proposes an analytical model that calculates the energy efficiency of both the basic and the RTS/CTS access mechanisms of the IEEE 802. II protocol. The model is validated with simulation results using NS-2 simulation package. The effects of the network size, the average packet length, the initial contention window and maximum backoff stages on the energy efficiency of both access mechanisms are also investigated. Results show that the basic scheme has low energy efficiency at large packet length and large network size, and depends strongly on the number of stations and the backoff procedure parameters. Conversely, the RTS/CTS mechanism provides higher energy efficiency when the network size is large, and is more robust to variations in the backoff procedure parameters. 展开更多
关键词 energy efficiency: IEEE 802. 11: wireless local area networks (WLANs) distributed co ordination function (DCF)
下载PDF
Secure Authentication of WLAN Based on Elliptic Curve Cryptosystem 被引量:1
20
作者 张龙军 韩玮 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第5期645-650,共6页
The security of wireless local area network (WI.AN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to t... The security of wireless local area network (WI.AN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to the serious secure leak in IEEES02.11 standards, it is impossible to utterly solve the problem by simply adding some remedies. Based on the analysis on the security mechanism of WLAN and the latest techniques of WI.AN security, a solution to WLAN security was presented. The solution makes preparation for the further combination of WLAN and Internet. 展开更多
关键词 SECURITY wireless local area network (WLAN) elliptic curve cryptosystem
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部