首页 > 最新文献

2007 3rd IEEE/IFIP International Conference in Central Asia on Internet最新文献

英文 中文
Modeling of processes of work oF cellular systems of mobile communication 移动通信蜂窝式系统的工作过程建模
Pub Date : 2007-12-12 DOI: 10.1109/CANET.2007.4401692
E.S. Rahmiddinov
This work devoted modeling of processes of work of cellular systems to mobile communication. With the help of the developed model it is possible to create virtual systems of cellular mobile communication and training programs showing processes of work of these systems. Is considered of coordinates (in what cell there is a subscriber) moving of the mobile subscriber with one cell in another, processes of identification of the equipment and authentication of the subscriber, also processes occurring at outgoing and entering calls.
这项工作致力于蜂窝系统的工作过程的建模,以移动通信。在开发的模型的帮助下,可以创建蜂窝移动通信的虚拟系统和显示这些系统工作过程的培训程序。考虑到移动用户与另一个小区中的一个小区的移动坐标(在哪个小区中有用户),设备识别和用户认证的过程,以及在呼出和呼入时发生的过程。
{"title":"Modeling of processes of work oF cellular systems of mobile communication","authors":"E.S. Rahmiddinov","doi":"10.1109/CANET.2007.4401692","DOIUrl":"https://doi.org/10.1109/CANET.2007.4401692","url":null,"abstract":"This work devoted modeling of processes of work of cellular systems to mobile communication. With the help of the developed model it is possible to create virtual systems of cellular mobile communication and training programs showing processes of work of these systems. Is considered of coordinates (in what cell there is a subscriber) moving of the mobile subscriber with one cell in another, processes of identification of the equipment and authentication of the subscriber, also processes occurring at outgoing and entering calls.","PeriodicalId":413993,"journal":{"name":"2007 3rd IEEE/IFIP International Conference in Central Asia on Internet","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133626256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A simple insight about availability guarantee with time variation in survivable WDM mesh networks 生存型WDM网状网络时变可用性保障的简单认识
Pub Date : 2007-12-12 DOI: 10.1109/CANET.2007.4401701
Xuetao Wei, Xingwei Wang, Lei Guo, Le Min Li
Availability is an important metric in mesh works. Many previous works have discussed differentiated services provision with availability guarantee. Nowadays, a new request that will use the special wavelengths to transmit different availability traffic appears. In the duration of its holding time, customers will have different availability requirements. Based on this, we propose a simple scheme called time aware availability guarantee (TAAG) to discuss availability guarantee with time variation. Compared to time unaware availability guarantee (TUAG) scheme, TAAG performs better in resource utilization, blocking probability and traffic throughput.
可用性是网格工程的一个重要指标。以前的许多工作都讨论了具有可用性保证的差异化服务提供。目前出现了一种利用特殊波长传输不同可用性流量的新要求。在其持有时间的持续时间内,客户会有不同的可用性要求。在此基础上,我们提出了一种简单的时间感知可用性保证(TAAG)方案来讨论具有时间变化的可用性保证问题。TAAG方案在资源利用率、阻塞概率和流量吞吐量等方面都优于TUAG方案。
{"title":"A simple insight about availability guarantee with time variation in survivable WDM mesh networks","authors":"Xuetao Wei, Xingwei Wang, Lei Guo, Le Min Li","doi":"10.1109/CANET.2007.4401701","DOIUrl":"https://doi.org/10.1109/CANET.2007.4401701","url":null,"abstract":"Availability is an important metric in mesh works. Many previous works have discussed differentiated services provision with availability guarantee. Nowadays, a new request that will use the special wavelengths to transmit different availability traffic appears. In the duration of its holding time, customers will have different availability requirements. Based on this, we propose a simple scheme called time aware availability guarantee (TAAG) to discuss availability guarantee with time variation. Compared to time unaware availability guarantee (TUAG) scheme, TAAG performs better in resource utilization, blocking probability and traffic throughput.","PeriodicalId":413993,"journal":{"name":"2007 3rd IEEE/IFIP International Conference in Central Asia on Internet","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122129645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of functional nodes for telecommunication devices based on Photo- Voltaic and Injection-Voltaic Effects. 基于光电和注入光伏效应的通信设备功能节点设计。
Pub Date : 2007-12-12 DOI: 10.1109/CANET.2007.4401705
K. Aripov, K. Bustanov, E. V. Ob’edkov, F. R. Nasirkhodjaev
The work is devoted to synthesis optoelectronic circuits of receiving nodes for telecommunication devices with amplification featuring enhanced work stability at high values of collector-emitter voltage, high working currents, i.e. in a mode with high dissipation power (several times higher comparing with any known modes of operations), which enables independent optimization of value of spectral sensitivity and amplification factor.
本工作致力于具有放大的电信器件接收节点的合成光电电路,该电路在高集电极-发射极电压、高工作电流,即在高耗散功率(比任何已知工作模式高数倍)的模式下增强工作稳定性,从而可以独立优化光谱灵敏度和放大因子的值。
{"title":"Design of functional nodes for telecommunication devices based on Photo- Voltaic and Injection-Voltaic Effects.","authors":"K. Aripov, K. Bustanov, E. V. Ob’edkov, F. R. Nasirkhodjaev","doi":"10.1109/CANET.2007.4401705","DOIUrl":"https://doi.org/10.1109/CANET.2007.4401705","url":null,"abstract":"The work is devoted to synthesis optoelectronic circuits of receiving nodes for telecommunication devices with amplification featuring enhanced work stability at high values of collector-emitter voltage, high working currents, i.e. in a mode with high dissipation power (several times higher comparing with any known modes of operations), which enables independent optimization of value of spectral sensitivity and amplification factor.","PeriodicalId":413993,"journal":{"name":"2007 3rd IEEE/IFIP International Conference in Central Asia on Internet","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129848945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing network availability by deflection based fast rerouting 通过基于偏转的快速重路由增强网络可用性
Pub Date : 2007-12-12 DOI: 10.1109/CANET.2007.4401675
Tao Yu, Shanzhi Chen, Xin Li, Zhen Qin
With the emergence of voice over IP and other realtime business applications, there is a growing demand for high network availability. Commonly deployed link state routing protocols such as OSPF react to link failures through global (i.e., network wide) link state advertisements and routing table recomputations, causing significant forwarding discontinuity after a failure. To improve network availability without jeopardizing routing stability, we propose a proactive local rerouting based approach. The proposed approach prepares for failures using deflection routing and upon a failure, suppresses the link state advertisement and instead triggers local rerouting using an alternate table. Both node and link failure can be handled when no more than one component failure occurs and the proposed approach always finds a loop-free path to a destination if one such path exists. The experimental results show that the proposed approach achieves excellent performance.
随着IP语音和其他实时业务应用的出现,对高网络可用性的需求日益增长。通常部署的链路状态路由协议,如OSPF,通过全局(即全网范围)的链路状态发布和路由表重新计算来响应链路故障,导致故障后的转发中断。为了在不损害路由稳定性的情况下提高网络可用性,我们提出了一种基于主动本地重路由的方法。提出的方法使用偏转路由为失败做准备,在失败时,抑制链路状态通告,而是使用备用表触发本地重路由。当不超过一个组件发生故障时,可以处理节点和链路故障,并且如果存在这样的路径,所建议的方法总是找到通往目的地的无环路路径。实验结果表明,该方法具有良好的性能。
{"title":"Enhancing network availability by deflection based fast rerouting","authors":"Tao Yu, Shanzhi Chen, Xin Li, Zhen Qin","doi":"10.1109/CANET.2007.4401675","DOIUrl":"https://doi.org/10.1109/CANET.2007.4401675","url":null,"abstract":"With the emergence of voice over IP and other realtime business applications, there is a growing demand for high network availability. Commonly deployed link state routing protocols such as OSPF react to link failures through global (i.e., network wide) link state advertisements and routing table recomputations, causing significant forwarding discontinuity after a failure. To improve network availability without jeopardizing routing stability, we propose a proactive local rerouting based approach. The proposed approach prepares for failures using deflection routing and upon a failure, suppresses the link state advertisement and instead triggers local rerouting using an alternate table. Both node and link failure can be handled when no more than one component failure occurs and the proposed approach always finds a loop-free path to a destination if one such path exists. The experimental results show that the proposed approach achieves excellent performance.","PeriodicalId":413993,"journal":{"name":"2007 3rd IEEE/IFIP International Conference in Central Asia on Internet","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129590064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scale-free topology for large-scale wireless sensor networks 大规模无线传感器网络的无标度拓扑
Pub Date : 2007-12-12 DOI: 10.1109/CANET.2007.4401663
Lili Wang, Jianxun Dang, Yi Jin, H. Jin
In this paper, we propose an efficient and fault tolerant topology control algorithm named AWSF for large-scale wireless sensor networks, which introduces the scale-free characteristic of complex networks into the topology of wireless sensor networks to minimize transmission delay and increase robustness. It is a distributed algorithm, letting each node locally adjust its transmission power and determine its neighbor relationship based on certain arbitrary weights which are random real numbers following a negative power-law probability distribution. The topology constructed under AWSF is proved to be scale-free, strongly connected and bi-directional. Simulation results show that the resulting topology has a small average degree and good network performance in terms of transmission delay and robustness.
本文针对大规模无线传感器网络,提出了一种高效、容错的拓扑控制算法AWSF,该算法将复杂网络的无标度特性引入到无线传感器网络的拓扑结构中,以减小传输延迟,提高鲁棒性。它是一种分布式算法,让每个节点根据一定的随机实数,服从负幂律概率分布,局部调整自己的传输功率,确定自己的邻居关系。证明了在AWSF下构造的拓扑是无标度的、强连通的和双向的。仿真结果表明,所得到的拓扑结构在传输时延和鲁棒性方面具有较小的平均度和良好的网络性能。
{"title":"Scale-free topology for large-scale wireless sensor networks","authors":"Lili Wang, Jianxun Dang, Yi Jin, H. Jin","doi":"10.1109/CANET.2007.4401663","DOIUrl":"https://doi.org/10.1109/CANET.2007.4401663","url":null,"abstract":"In this paper, we propose an efficient and fault tolerant topology control algorithm named AWSF for large-scale wireless sensor networks, which introduces the scale-free characteristic of complex networks into the topology of wireless sensor networks to minimize transmission delay and increase robustness. It is a distributed algorithm, letting each node locally adjust its transmission power and determine its neighbor relationship based on certain arbitrary weights which are random real numbers following a negative power-law probability distribution. The topology constructed under AWSF is proved to be scale-free, strongly connected and bi-directional. Simulation results show that the resulting topology has a small average degree and good network performance in terms of transmission delay and robustness.","PeriodicalId":413993,"journal":{"name":"2007 3rd IEEE/IFIP International Conference in Central Asia on Internet","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130855441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Data privacy in mobile agent communication 移动代理通信中的数据隐私
Pub Date : 2007-12-12 DOI: 10.1109/CANET.2007.4401685
D. Adane, P. Adane, S. Sathe
Communicating with confidential data requires special attention in a mobile agents environment, especially when the other hosts must be prevented from eavesdropping the communication. We propose two methods for secured communication between the agent and a host (or other agent). The first approach for an untrusted environment uses on the fly encryption-decryption sequence to directly convert the message or plaintext into one that is encrypted directly with the public key of receiver thus reducing the overhead of retrieving the public key of sender. The technique uses AIGamal encryption/decryption. Theoretically it is proved that this scheme indeed gives the desired result. The second approach uses a trusted central authority for supply of public keys. It uses time stamps, identity of agents and RSA algorithm to provide a secured communication. Our minimal implementation of this technique suggests that it is possible to embed the entire functionality for communication security within an agent. Finally, we also state and explain how the second approach is useful in context of mobile agents with itinerary.
在移动代理环境中,与机密数据进行通信需要特别注意,特别是当必须防止其他主机窃听通信时。我们提出了代理和主机(或其他代理)之间安全通信的两种方法。对于不受信任的环境,第一种方法使用动态加密-解密序列,直接将消息或明文转换为使用接收方公钥直接加密的消息或明文,从而减少检索发送方公钥的开销。该技术使用igamal加密/解密。从理论上证明了该方案确实能达到预期的效果。第二种方法使用可信的中央权威机构来提供公钥。它使用时间戳、代理身份和RSA算法来提供安全的通信。我们对该技术的最小实现表明,可以在代理中嵌入通信安全的整个功能。最后,我们还陈述并解释了第二种方法在具有行程的移动代理环境中的用处。
{"title":"Data privacy in mobile agent communication","authors":"D. Adane, P. Adane, S. Sathe","doi":"10.1109/CANET.2007.4401685","DOIUrl":"https://doi.org/10.1109/CANET.2007.4401685","url":null,"abstract":"Communicating with confidential data requires special attention in a mobile agents environment, especially when the other hosts must be prevented from eavesdropping the communication. We propose two methods for secured communication between the agent and a host (or other agent). The first approach for an untrusted environment uses on the fly encryption-decryption sequence to directly convert the message or plaintext into one that is encrypted directly with the public key of receiver thus reducing the overhead of retrieving the public key of sender. The technique uses AIGamal encryption/decryption. Theoretically it is proved that this scheme indeed gives the desired result. The second approach uses a trusted central authority for supply of public keys. It uses time stamps, identity of agents and RSA algorithm to provide a secured communication. Our minimal implementation of this technique suggests that it is possible to embed the entire functionality for communication security within an agent. Finally, we also state and explain how the second approach is useful in context of mobile agents with itinerary.","PeriodicalId":413993,"journal":{"name":"2007 3rd IEEE/IFIP International Conference in Central Asia on Internet","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129906929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Implantation of optical materials by rare-earths elements - erbium 稀土元素-铒在光学材料中的注入
Pub Date : 2007-12-12 DOI: 10.1109/CANET.2007.4401696
T. Radjabov, A. M. Nazarov, A. Simonov, S.V. Pichko, Z. Khakimov
Optical methods of an information communication requires development of the technology of processing of optical materials for making the active optical mediums. The method of a doping of optical materials by rare earths by an ion-beam deposition with the subsequent thermal bakeout was explored which allows to make enough uniform stratums of erbium and on sufficient depth in optic fibers.
信息通信的光学方法要求发展用于制造有源光介质的光学材料加工技术。本文探讨了用离子束沉积法在光纤中掺杂稀土的方法,该方法可以在光纤中形成足够均匀的铒层和足够的深度。
{"title":"Implantation of optical materials by rare-earths elements - erbium","authors":"T. Radjabov, A. M. Nazarov, A. Simonov, S.V. Pichko, Z. Khakimov","doi":"10.1109/CANET.2007.4401696","DOIUrl":"https://doi.org/10.1109/CANET.2007.4401696","url":null,"abstract":"Optical methods of an information communication requires development of the technology of processing of optical materials for making the active optical mediums. The method of a doping of optical materials by rare earths by an ion-beam deposition with the subsequent thermal bakeout was explored which allows to make enough uniform stratums of erbium and on sufficient depth in optic fibers.","PeriodicalId":413993,"journal":{"name":"2007 3rd IEEE/IFIP International Conference in Central Asia on Internet","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128114707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel multi-service scheduling scheme for e-utra 一种新的e- ultra多业务调度方案
Pub Date : 2007-12-12 DOI: 10.1109/CANET.2007.4401669
Bin Chen, Honglin Hu, Bin Wang, Haifeng Wang
In this paper, we present a novel multi-service scheduling scheme while satisfying the principle of multi-service operation in E-UTRA. Instantaneous buffered packet size is used to modify the traditional proportional fair scheduling algorithm for reducing padding probability. Swapping resource between different services users satisfies the principle of multi-service operation and increases multi-user/service diversity. The simulation results demonstrate that the proposed scheme can increase system throughput and fairness among users.
在满足E-UTRA多业务运行原则的前提下,提出了一种新的多业务调度方案。利用瞬时缓冲数据包大小对传统的比例公平调度算法进行改进,以降低填充概率。在不同业务用户之间交换资源,满足多业务运行的原则,增加了多用户/业务的多样性。仿真结果表明,该方案能够提高系统吞吐量和用户间公平性。
{"title":"A novel multi-service scheduling scheme for e-utra","authors":"Bin Chen, Honglin Hu, Bin Wang, Haifeng Wang","doi":"10.1109/CANET.2007.4401669","DOIUrl":"https://doi.org/10.1109/CANET.2007.4401669","url":null,"abstract":"In this paper, we present a novel multi-service scheduling scheme while satisfying the principle of multi-service operation in E-UTRA. Instantaneous buffered packet size is used to modify the traditional proportional fair scheduling algorithm for reducing padding probability. Swapping resource between different services users satisfies the principle of multi-service operation and increases multi-user/service diversity. The simulation results demonstrate that the proposed scheme can increase system throughput and fairness among users.","PeriodicalId":413993,"journal":{"name":"2007 3rd IEEE/IFIP International Conference in Central Asia on Internet","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131887090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The mathematical model of data transmission network elements reliability evaluation 数据传输网元可靠性评估的数学模型
Pub Date : 2007-12-12 DOI: 10.1109/CANET.2007.4401698
B.A. Davletyarov, N.H. Gulturaev
This article is devoted to development of mathematic model of reliability evaluation index - the readiness coefficient of data transmission tracks in the control objects of telecommunication networks depending on non-failure parameters, restorability and technical service frequency.
本文研究了基于非故障参数、可恢复性和技术服务频率的电信网络控制对象中数据传输路径就绪系数可靠性评价指标的数学模型。
{"title":"The mathematical model of data transmission network elements reliability evaluation","authors":"B.A. Davletyarov, N.H. Gulturaev","doi":"10.1109/CANET.2007.4401698","DOIUrl":"https://doi.org/10.1109/CANET.2007.4401698","url":null,"abstract":"This article is devoted to development of mathematic model of reliability evaluation index - the readiness coefficient of data transmission tracks in the control objects of telecommunication networks depending on non-failure parameters, restorability and technical service frequency.","PeriodicalId":413993,"journal":{"name":"2007 3rd IEEE/IFIP International Conference in Central Asia on Internet","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134326494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
“Nino” man-in-the-middle attack on bluetooth secure simple pairing “Nino”中间人攻击蓝牙安全简单配对
Pub Date : 2007-12-12 DOI: 10.1109/CANET.2007.4401672
Konstantin Hyppönen, Keijo Haataja
As an interconnection technology, Bluetooth has to address all traditional security problems, well known from the distributed networks. Moreover, as Bluetooth networks are formed by the radio links, there are also additional security aspects whose impact is yet not well understood. In this paper, we describe a new man-in-the-middle (MITM) attack on Bluetooth secure simple pairing. The attack is based on the falsification of information sent during the input/output capabilities exchange. In addition, we propose countermeasures that render the attack impractical, although not totally eliminating its potential danger.
蓝牙作为一种互连技术,必须解决分布式网络中存在的所有传统安全问题。此外,由于蓝牙网络是由无线电链路组成的,因此还存在其他安全方面的影响尚未得到很好的理解。本文描述了一种新的针对蓝牙安全简单配对的中间人(MITM)攻击。这种攻击基于在输入/输出功能交换期间发送的信息的伪造。此外,我们提出了使攻击变得不切实际的对策,尽管不能完全消除其潜在危险。
{"title":"“Nino” man-in-the-middle attack on bluetooth secure simple pairing","authors":"Konstantin Hyppönen, Keijo Haataja","doi":"10.1109/CANET.2007.4401672","DOIUrl":"https://doi.org/10.1109/CANET.2007.4401672","url":null,"abstract":"As an interconnection technology, Bluetooth has to address all traditional security problems, well known from the distributed networks. Moreover, as Bluetooth networks are formed by the radio links, there are also additional security aspects whose impact is yet not well understood. In this paper, we describe a new man-in-the-middle (MITM) attack on Bluetooth secure simple pairing. The attack is based on the falsification of information sent during the input/output capabilities exchange. In addition, we propose countermeasures that render the attack impractical, although not totally eliminating its potential danger.","PeriodicalId":413993,"journal":{"name":"2007 3rd IEEE/IFIP International Conference in Central Asia on Internet","volume":"290 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122979617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
期刊
2007 3rd IEEE/IFIP International Conference in Central Asia on Internet
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1