Proceedings of the 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016)

Research on Wireless Network Security Technology

Authors
Weng-jing Yang, Zhi-yuan Li, Huai-jun Zhou, Ran Li, Hai-yan Zhao
Corresponding Author
Weng-jing Yang
Available Online April 2016.
DOI
10.2991/ameii-16.2016.61How to use a DOI?
Keywords
Wireless Networking, Security Technology, Privacy Protection
Abstract

With the popularization and application of wireless networks, people are dependent on wireless networks is increasing, at the same time the security of wireless networks has become the focus of attention. In this paper, a wireless network security methods and technology were more in-depth study, since the wireless network transmission medium inherent openness, limited wireless terminal resources, mobility and dynamic network topology wireless terminal, not only makes wireless network face greater security risks, so many security methods wired network environment. User authentication is one of the most important security services are dependent on it to some extent all the other security services. Design a user authentication scheme, effectively reducing the cost of communications and computing participants. Consider security user domain is proposed based on Trusted Mobile Platform (TMP), combined with the current mainstream smart phone hardware architecture, given the construction of smart phones mainstream processor-based, and discussed on this platform TPM method.

Copyright
© 2016, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016)
Series
Advances in Engineering Research
Publication Date
April 2016
ISBN
10.2991/ameii-16.2016.61
ISSN
2352-5401
DOI
10.2991/ameii-16.2016.61How to use a DOI?
Copyright
© 2016, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Weng-jing Yang
AU  - Zhi-yuan Li
AU  - Huai-jun Zhou
AU  - Ran Li
AU  - Hai-yan Zhao
PY  - 2016/04
DA  - 2016/04
TI  - Research on Wireless Network Security Technology
BT  - Proceedings of the 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016)
PB  - Atlantis Press
SP  - 296
EP  - 299
SN  - 2352-5401
UR  - https://doi.org/10.2991/ameii-16.2016.61
DO  - 10.2991/ameii-16.2016.61
ID  - Yang2016/04
ER  -