Research on Information Security Algorithm of Wireless Communication System

Article Preview

Abstract:

The ubiquitous network and it provides the high quality wireless service, all depends on the wireless communication system network security level. Safety algorithm for wireless communication system constructed in different network reliability. In this paper, based on the wireless communication system to study on information security technology, as the development of information security provides a theoretical basis.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

297-300

Citation:

Online since:

March 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] QinyunDai, YunfeiWang. Network security usher in the 3G era[J]. Information security and communication, 2010 (5): 11-14.

Google Scholar

[2] Jiang Chang, ShufenDing. Study on security technology of wireless network[J]. Computer knowledge and Technology, 2009(14): 32-34.

Google Scholar

[3] Yucui Li, Cuihua Chao. The model and its implementation of wireless network data security [J]. Modern electronic technology, 2008(17): 45-47.

Google Scholar

[4] T. Chrysikos,G. Georgopoulos, K. Birkos,S. Kotsopoulos. Wireless Channel Characterization: On he validation issues of indoor RF models at 2. 4GHz, Pacet ( Panhellenic Congress of Electronics and Communications ), Patras, Greece, 2009, March: 20 – 22.

Google Scholar

[5] Stallings,W. Wireless Communication and Networkin. Upper Saddle River, NJ: Prentice Hall, 2002: 2110-2114.

Google Scholar

[6] Housely,R. And, Arbaugh, W. Security Problems in 802. 11-Based Networks[J]. Communications of the ACM, 2003, 46 (5): 1325-1327.

Google Scholar