Analysis of key security technologies for wireless heterogeneous networks (1)

Source: Internet
Author: User
Keywords Secure cellular network
In the past more than 10 years, the rapid development of global mobile communications, the rapid growth of cellular mobile users, in addition to a single voice service, data services have been greatly increased. However, wireless networks, including cellular networks, must continue to provide ubiquitous communication capabilities to meet the growing need for communication and access to the Internet. Heterogeneous network fusion is a new concept--to integrate all kinds of networks as much as possible, and to provide a variety of services on a common network platform has always been the goal of people's pursuit. One of the main features of 4G networks is the ability to provide interoperability between different wireless access technologies, the integration of wireless local area network (WLAN) and 3G networks, and the integration of Ad hoc networks and cellular networks are all important modes of wireless heterogeneous networks integration. Network fusion technology can greatly improve the performance of cellular networks, while supporting the traditional services, it also creates conditions for the introduction of new service, and becomes the hotspot technology of the next generation Wireless mobile network supporting heterogeneous interconnection and collaborative application. Wireless heterogeneous network fusion has been highly valued and studied by the industry in recent years [1-6]. As with all communication networks and computer networks, the problem of information security is also an important issue that must be paid attention to in the process of developing wireless heterogeneous networks. Heterogeneous networks integrate the advantages of their respective networks, and will inevitably bring the corresponding shortcomings into the converged network. In addition to the inherent security requirements of the original network, heterogeneous networks will also face a series of new security problems, such as network security, seamless convergence of security protocols, and new security requirements brought by diversified new services. Constructing a new model, key security technology and method for the security protection of wireless heterogeneous networks with high flexibility is an important issue to be concerned in the development of wireless heterogeneous networks. Although the security of traditional GSM network, WLAN and hoc network has been paid great attention and applied in practice, the research on the problem of heterogeneous network security is just getting started. In the next generation Public mobile network environment, this paper will study secure routing protocol, access authentication technology, intrusion detection technology, encryption and decryption technology, cooperative communication between nodes to improve the security of wireless heterogeneous networks. 1 security solutions for hoc networks are well known, because of the inherent characteristics of ad hoc networks, such as open media, dynamic topology, distributed cooperation and limited energy, both legitimate network users and malicious intrusion nodes can access the wireless channel, which makes it vulnerable to various attacks. The security situation is also more severe than the general wireless network. At present, there are many related exposition about the security problem of ad hoc network [7-11]. The attacks in Ad hoc networks can be divided into two types, passive and active attacks. At present, the security protection of ad hoc network mainly has two kinds of technology: first, a priori protection mode: To prevent the network from being attacked. The technology involved mainly includes authentication, encryption algorithm and key points.UNCTAD。 Second, reactive protection methods: detect malicious nodes or intruders, thereby excluding or preventing intruders from entering the network. This technology includes intrusion detection technology (monitoring architecture, information acquisition, and appropriate response to attacks). In literature [12] and literature [13], the key distribution technology of ad Hoc Group is described in the absence of a certification center, and the validity of the key establishment is also studied in document [12]. However, these two key distribution schemes only apply to small-scale ad hoc networks where the nodes can communicate directly with each other. There is also a distributed authenticated threshold cipher scheme, which is coordinated by several nodes in the network to accomplish the function of the Authentication Center (CA), which improves the robustness of the network, because it eliminates the possibility of the capture of one or a few nodes and destroys the key management of the whole network. In [14] the paper studies a kind of non-centralized key distribution scheme, assuming that each mobile node has a trusted node group in its nearest neighbor, the two nodes exchange the public key by merging the relevant information of their respective node groups, which greatly increases the credibility of the key obtained. However, the scheme still has the potential to fail key distribution, especially for large-scale ad hoc networks. Routing security is an important problem in ad hoc networks. In the present secure routing scheme, if a priori protection scheme is used, a digital signature can be used to authenticate the information unchanged in the message, and the hash chain is used to encrypt the hop count information to prevent the intermediate malicious node from adding false routing information [15], or to bind the IP address to the media access control (MAC) address. , authenticate at the link layer to increase security [16]. Using the reaction scheme, the intrusion detection method can be used. Each node has its own intrusion detection system to monitor the perimeter of the node, while the neighboring nodes can exchange intrusion information with each other. Of course, a successful intrusion detection system is very complex, and also depends on the degree of trust of the neighboring nodes. The watchdog scheme can also protect grouped data from being discarded, tampered with, or incorrectly inserted in routing information during forwarding [17]. In addition, how to enhance the security of routing protocols such as AODV and DSR is also being studied [18-19]. In a word, the security of ad hoc network is completely due to its own no center structure, the Distributed security mechanism can improve the security of ad hoc network, however, the increase of network overhead and decision time, inaccurate security judgment still puzzles the ad hoc network. 1 2 3 4 Next >> view full-text navigation page 1th: security Solution for Hoc Network page 2nd: Security Architecture page 3rd: Access Authentication Technology 4th page: node collaboration communication of heterogeneous wireless Networks Original: Analysis of key security technologies of wireless heterogeneous networks (1) Return to network Ann All Home

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.