期刊文献+

基于PPDR的动态无线网络安全模型的改进研究 被引量:8

The Improved Research of Dynamic Wireless Network Security Model Based on the PPDR
下载PDF
导出
摘要 为了解决PPDR模型在主动性防御、风险评估及安全策略生成等方面存在的缺陷问题,提出了基于PPDR分布式策略的可动态自调节的无线网络安全模型。在动态无线网络中,改进的网络安全模型主要是通过数据流的特征匹配,负责检测以及流量的过滤;根据安全策略对流经的数据包进行检测分析;根据日志记录增加对应的新安全策略,通过AP互动实现响应的连接、控制及交互。该改进模型很好地实现了安全策略的动态自调节,有效解决了无线网络中移动终端与外接入点之间的协调以及策略更新。仿真实验及应用表明,改进的动态无线网络安全模型可以实时更新安全策略,能够更好地适应动态性的无线网络。 In order to solve the problems of active defense, risk assessment and safety strategy in the PPDR model, a wireless net-work security model based on the PPDR distributed strategy and dynamic self adjusting has been proposed. In the dynamic wireless network, the improved network security model is responsible for the detection and flow filtration through the feature match of data flow. Detection analysis of flow data packet is made according to the security strategy. The corresponding strategy is employed according to the log records. The response connection, control and interaction is achieved through the AP interaction. The improved model has achieved a very good security strategy for dynamic self-adjusting, and solved the coordination between the mobile terminal and access point. The simulation and application shows that the improved model can been updated in real time and can better adapt to the dynamic wireless network.
出处 《盐城工学院学报(自然科学版)》 CAS 2013年第3期38-43,共6页 Journal of Yancheng Institute of Technology:Natural Science Edition
关键词 PPDR模型 无线网络 安全模型 自调节 PPDR model Wireless network Security model Self - regulation
  • 相关文献

参考文献7

二级参考文献44

  • 1李骐,陈涤.基于无线-有线混合网的TCP友好速率控制算法[J].计算机工程,2007,33(3):85-87. 被引量:4
  • 2ISO/IEC FDIS 17799. Information technology-Security techniques-Code of practice for information security management. 2005. 被引量:1
  • 3ISO/IEC 13335. Information technology-Security techniques. Guidelines for the management of IT security (GMITS). 2001. 被引量:1
  • 4Winn Schwartau. Time Based Security, 1999-2001. 被引量:1
  • 5GUSTAFSSON E,JONSSON A.Always best connected[J].IEEE Wireless Communications,2003,10(l):49-55. 被引量:1
  • 6BETH T,BORCHERDING M,KLEIN B.Valuation of trust in open networks[C] // Proceedings of the Third European Symposium on Research in Computer Security.Berlin:Springer-Verlag,1994:3-18. 被引量:1
  • 7J0SANG A,KNAPSKOG S J.A metric for trusted systems[EB/OL].[2009-12-12].http://csrc.nist.gov/nissc/1998/proceedings/paperA2.pdf. 被引量:1
  • 8LI X G,LIU L.A reputation based trust model for peer-to-peer ecommerce communities[C] // The IEEE International Conference on E-Commerce.Washington,DC:IEEE,2003:275 -284. 被引量:1
  • 9Omueti M O.TCP-ADaLR: TCP with adaptive delay and loss response for broadband GEO satellite networks[D].Simon Fraser University, 2007. 被引量:1
  • 10Rizzo L.PGMCC: A TCP-friendly single-rate multicast congestion control scheme[C]//ACM SIGCOMM'00,2000. 被引量:1

共引文献13

同被引文献50

引证文献8

二级引证文献55

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部