Some security issues of wireless systems

合集下载

wireless manageability 感叹号

wireless manageability 感叹号

Wireless ManageabilityIntroductionWireless manageability refers to the ability to effectively and efficiently manage wireless networks. With the increasing use of wireless technologies in various industries, managing these networks has become crucial. This article will explore the concept of wireless manageability, including its benefits, challenges, and best practices.Benefits of Wireless Manageability1.Increased flexibility: Wireless manageability allows for greaterflexibility in network deployment and configuration. It enablesorganizations to quickly adapt to changes and scale their networks as needed.2.Cost-effective: Wireless manageability reduces the need forphysical infrastructure, such as cabling. This not only savesinstallation costs but also makes it easier to reconfigure andexpand the network without additional expenses.3.Remote access: With wireless manageability, network administratorscan remotely monitor and manage networks from any location. Thiseliminates the need for on-site personnel, leading to improvedefficiency and reduced downtime.4.Centralized control: Wireless manageability provides a centralizedplatform for managing multiple access points and devices. Thissimplifies network administration and reduces the chances oferrors or inconsistencies.5.Enhanced security: Wireless manageability enables theimplementation of advanced security measures, such as encryptionprotocols and authentication mechanisms. This ensures that thenetwork is protected from unauthorized access and data breaches.Challenges in Wireless Manageability1.Interference: Wireless networks are susceptible to interferencefrom other devices, such as microwaves or neighboring networks.Managing and mitigating these interference issues can bechallenging and requires careful planning and monitoring.2.Scalability: As the number of wireless devices and users increases,scaling the network infrastructure becomes a challenge. Ensuringseamless connectivity and optimal performance for all users iscrucial in wireless manageability.3.Bandwidth management: With the growing demand for high-speedinternet and bandwidth-intensive applications, managing bandwidthallocation and prioritization becomes essential. Failure to do socan result in network congestion and slow performance.4.Security vulnerabilities: Wireless networks are more vulnerable tosecurity threats compared to wired networks. Managing and securing the network infrastructure, including access points,authentication mechanisms, and encryption protocols, is criticalto prevent unauthorized access and data breaches.Best Practices for Wireless Manageabilitywork planning: Proper planning and design are essential foreffective wireless manageability. This includes choosing the right hardware, strategically placing access points, and consideringfactors like coverage, capacity, and interference.2.Regular monitoring: Continuous monitoring of the wireless networkenables proactive detection and resolution of issues. Networkadministrators should monitor performance metrics, security logs,and network traffic patterns to identify potential problems andtake appropriate actions.3.Firmware and software updates: Keeping the firmware and softwareof wireless devices up-to-date is crucial for network stabilityand security. Regular updates help address known vulnerabilitiesand improve overall performance and compatibility.4.Access control: Implementing strong access control measures, suchas secure authentication methods and user policies, is essentialto ensure network security. This includes using strong passwords,enabling two-factor authentication, and regularly reviewing useraccess privileges.5.Performance optimization: Network administrators should regularlyoptimize the wireless network for better performance. Thisincludes adjusting transmit power, optimizing channel allocation, and fine-tuning Quality of Service (QoS) settings.6.Regular backups: Regularly backing up network configurations andother critical data is crucial for disaster recovery and business continuity. This ensures that network settings can be quicklyrestored in case of any issues or system failures.7.Employee training: Providing employees with proper training onwireless network usage, security protocols, and best practices is essential. This helps avoid common mistakes, such as connecting to unsecured networks or falling for phishing attempts, which cancompromise network security.ConclusionWireless manageability plays a significant role in the effective management of wireless networks. By providing increased flexibility, cost-effectiveness, and centralized control, wireless manageability enables organizations to optimize their networks for improved performance and security. However, it also presents challenges like interference, scalability, and security vulnerabilities, which must be addressed through proper planning, monitoring, and implementation of best practices. By following these best practices, organizations can successfully manage their wireless networks and ensure seamless connectivity and optimal performance for users.。

高中高考英语语法填空高频专题专练2:科技信息与发明创新(学生版)

高中高考英语语法填空高频专题专练2:科技信息与发明创新(学生版)

专题02 科技信息与发明创新1. (2023·江苏省南京市·模拟题)ChatGPT is high-tech progress,not a revolutionChatGPT is a powerful chatbot developed by OpenAI and launched in November 2022. (1)______ (build)on top of OpenAI's GPT-3 family of large language models,it engages in human-like dialogue egged by prompting.It (2)______ (design)to respond in a natural,intuitive way and has numerous potential uses.From a scientific point of view,there is a need to closely watch the development of such (3)______ (technology)before reaching a conclusion about their efficacy and helpful nature.Technology progresses step by step.So we should not panic thinking ChatGPT will take up jobs (4)______ till now needs humans to fulfill.ChatGPT is an example of high-tech progress,not a revolution.First,ChatGTP (5)______ (make)quite some progress in natural language processing,yet it still has a long way to go to completely understand the human mind and language faculty,because when it comes to professional writing,ChatGPT at times writes plausible-sounding but (6)______ (correct)or nonsensical answers.It might give some good answers to most of the general questions,(7)______ it is no substitute for professional advice,such as medical prognosis and prescriptions,or legal advice.Second,ChatGPT is still a product (8)______ very limited application.It has the potential to be used for enhancing search engine functionality but,as a pre-trained language model,it will have limited use.Due to these limitations,investors should not (9)______ (blind)invest huge amounts to further develop ChatGPT and should not expect quick returns on investment.Yet as a (10)______ (promise)AI development,ChatGPT is likely to advance in the medium,if not the short term.2. (2023·安徽省·单元测试) So rapidly does the technology develop that no one can predict what may happen tomorrow. The number of 5G users in China has reached 20 percent, which leaves the people in the world (1) (amaze). In China, operators are quick to provide continuous nationwide coverage, (2) (ensure) users a consistent experience. They also offer flexible service packages, which delivers a beneficial result for both users and (3) (they).High-quality 5G networks (4) (drive) rapid growth of mobile data traffic so far, according to Ding Yun, Huawei's executive director and president of its carrier business group. (5) is estimated, the average data traffic per user per month will reach 600 GB by 2030. The energy consumption of wireless networks will (6) (definite) increase a lot if energy efficiency of existing networks remains unchanged. However, (7) has been confirmed is that Huawei has offered a comprehensive range of products and measures that address the power consumption issues of wireless networks.Huawei has already employed low-carbon (8) (strategy) in more than 100 countries, including Saudi Arabia, Greece, Pakistan and Switzerland, helping operators reduce carbon dioxide emissions by 40 million tons. As (9) important player in the communications industry, Huawei will continue to put green development at the center of everything it does and develop innovative ways to build (10) (green) 5G networks worldwide than before.3. (2022·浙江省·历年真题) To understand a painting, we're taught to look for color, composition, and light. But how can a painting (1) (appreciate) by someone who's blind? Through touch, the one thing gallery signs tell you not (2) (do). John Olson, a former (3) (photograph) and his team turn paintings into fully textured 3D models.The tactile (可触知的) paintings work as a way to show art to (4) blind because we don't see with just our eyes: We see with our brains. Research in the field of neuroplasticity—the brain's adaptability—shows that the visual cortex (大脑皮层) is made active by touch. Blind people recognize shapes with their (5) (exist) senses, in a way similar to that of (6) (sight) people, says Ella Striem-Amit, a Harvard scientist.Luc Gandarias, who's now thirteen, went blind suddenly (7) age seven. When he felt a 3D version of Leonardo da Vinci's "Mona Lisa" he (8) (notice) her smile right away. "I can actually feel what you see when you look at it," he said.For Luc, this means (9) (independent). "The feeling of being able to see it (10) to form my opinion is like breaking down another wall as a blind person."4. (2023·山东省日照市·模拟题)A robot has been taught to laugh at jokes to make it more human. Researchers are using AI to train robots about appropriate laughter, and (1) (distinguish) between chuckles and screams.They described (2) (work) with a robot called Erica in the hope of making a conversationmore natural. "We think that one of the important (3) (function) of conversational Al is sympathy," said Dr Koji Inoue, a professor. "A conversation is, of course, multimodal, not just responding correctly. So we decided that one way a robot can empathize (共情) with users is to share their laughter, (4) you cannot do with a text-based chatbot."Creating a " (5) (share) laughter" model, the researchers used AI to help detect laughter and decide whether to laugh and what kind of laughter would be (6) (good). Four short dialogues between real people and Erica (7) (use) to test the system, which performed well.However, the experts said there is more work to do to create (8) (true) natural laughter situations.Dr Inoue said, "The robot should actually have (9) distinct character, and it can show this character through its conversational behaviors, such as laughing, ye gaze, gestures and speaking styles. It may well take more than 10 to 20 years before we can finally have a casual chat (10) a robot like we would with a friend."5. (2023·福建省·联考题) World Oceans Day is an international day that takes place annually on 8 June. It is observed as a (1) (remind) every year of the destruction (2) (cause) by human activities like garbage and waste water treatment and oil leaks. This year the main purpose of the Day is to inform a (3) (wide) public of the impact of human actions (4) the ocean, expecting more people (5) (care) about the worsening situation.The Day is now celebrated in over 100 countries with hundreds of special events broadcast across the globe. It (6) (mark) in a variety of ways, including launching new campaigns and holding special events, to advance ocean conservation and education.Young people are an important part. The Day provides them with a platform (7) they can express their concerns and share their ideas. Each year, the Day has a theme for the campaigns and events. For example, in 2016 and 2017 the themes were "Healthy oceans, healthy planet" and "Our oceans, our future", (8) (respective). "Collective Action for the Ocean" is the theme in 2022, (9) (throw) light on the communities, ideas, and solutions that are working together to protect and recover the ocean (10) everything it sustains.6. (2023·安徽省·模拟题) Himalayan snow leopards, about which little (1) (know), live in harsh, remote, mountainous landscapes with threats including habitat loss, conflict with people and illegaltrade. Climate change is also adding additional (2) (press). With as few as 4,000 individuals (3) (remain) in the wild across 12 range countries, additional research is critical.WWF is supporting research in the snow leopard range countries, in collaboration (合作) with national governments and other organizations, (4) (build) a more accurate picture of the snow leopard's global status. (5) spring 2021, a dedicated team of WWF conservationists started a 10-day expedition in the western part of the Khangchendzonga National Park, India. Trekking (徒步旅行) high into the mountainous area of the Himalaya, they checked the 28 camera traps (6) had been positioned just a few months (7) (early) at altitudes between 4000m and 4800m and (8) (look) for signs of snow leopard prey species.Remarkably, images recorded by the camera traps (9) (confirm) the presence of snow leopards in at least 3 locations so far, including an incredible sighting of a mother with two cubs. (10) team will continue analysing the thousands of images, using this important data to gain vital information on the presence, distribution, population and prey of snow leopards.7. (2023·广东省广州市·期中考试) Northwest China's Ningxia Hui Autonomous Region has adopted digital technology (1) (preserve) ancient cliff (悬崖) carvings and paintings before their disappearance.Workers have copied more than 2,000 immovable rock carvings and paintings at Helan Mountain to digitalize the overall views as well as (2) (they) accurate locations. The digital information will be sorted and workers will conduct a disease analysis.Rock carvings (3) (appear) before writing systems were invented. Now, more than 20,000 cliff paintings and carvings (4) were created by the ancestors have been discovered at Helan Mountain. The works record the lives of the people who lived 3,000 to 10,000 years ago. In general, (5) (image) of animals dominate (占主要地位), followed (6) humans, vehicles, plants, planets, fingerprints and abstract signs. The surfaces were (7) (main) carved with stone or metal in the open air, (8) (expose) to weather beaten.The protection of rock paintings and carvings is a worldwide issue. At present, there is no (9) (effect), naturally scientific and technological means to prevent their disappearance. Some experts have predicted that by the end of this century, (10) quarter of the world's rock paintings will disappear completely.8. Face recognition technology has made the journey from science fiction fancy (1) the everyday familiar thing in our lives. In particular, facial recognition can be divided into two separate (2) (technique) for identifying individuals: face detection and face identification. Face detection refers to (3) (find) a human face within an image and identifying the measurements, relative placement and size of facial features. Face identification determines the identity of (4) human face by comparing it with existing photos in a database.Japan's NEC (5) (develop) face recognition technology in the late 1990s. Its NeoFace system can (6) (accurate) identify human faces both in still images and videos. Recognition can be performed while subjects are walking naturally, (7) means that there's no need to remain still in front of a camera.In the past few years, many new applications for face recognition technology (8) (appear). For example, in office building cafeterias, face recognition technology can shorten the check-out process. Banks can also employ the system (9) (detect) VIP customers once they have entered the bank. With both security and (10) (convenient) in mind, NEC attempts to use face recognition technology in building a better future for all.9. (2022·辽宁省·月考试卷) A maglev (磁悬浮) bullet train that can reach speeds of 600 kilometers per hour (373 miles per hour) has made its debut (亮相) in Qingdao, China.(1) (develop) by the state-owned China Railway Rolling Stock Corporation, its considered the world's (2) (fast) train.Liang Jianying, deputy general manager and chief engineer of CRRC Sifang, told Chinese state media that in addition to its speed, (3) train emits (排放) low levels of noise pollution and requires less maintenance than other high-speed trains.A prototype (原型) of the new maglev train (4) (reveal) to media in 2019. That same year, China announced (5) (ambition) plans to create "3-hour transportation circles" between major metropolitan areas.High-speed rail is a major priority in China, (6) aims to connect more of its large cities by train (7) (reduce) the time and expense required to travel around the world's most populous country.(8) (current), the average high-speed train in China can run at about 350 kph, while planes fly at 800-900 kph. Trains like the one unveiled in Qingdao this week could fill a critical middle space.Several new maglev networks are reportedly under (9) (construct), including one linking Shanghai and Hangzhou and (10) connecting Chengdu and Chongqing.10. The Internet is a technological wonder, (1) (bring) about changes in all aspects of our lives. The Internet has the power (2) (connect) people across the world to a single shared community.One of the greatest advantages of the Internet (3) (lie) in the quick and easy access to a huge amount of information. With the click of a mouse or the touch of a button, (4) is possible to find out almost anything we want to know. The Internet has also made our lives unbelievably (5) (convenience). You can have food (6) (deliver) to you using food delivery apps and sites. Above all else, the Internet helps us build social bonds. There are (7) (end) ways to share our views on matters.However, (8) the Internet brings many valuable advantages, there are many negative effects the Internet has on our lives. We must be aware (9) these problems and use the Internet properly. It is important for us to learn how to handle the problems (10) the Internet has caused.11. (2020·江苏省南通市·模拟题) Robots have certain advantages compared to humans: They are efficient, tireless, can be repaired when (1) (damage) and they never get sick. This last trait (特征) has made them the star during our fight against the COVID-19 pandemic (流行病). For example, ultraviolet-light-disinfection robots are being (2) (wide) used to clean hospital corridors and wards (病房). This is (3) some experts say that the COVID-19 outbreak is the "tipping point" (临界点) for robots start to replace humans in certain jobs. According to futurist Martin Ford, even when the pandemic is over, people (4) (prefer) to go to a place that has fewer human (5) (employ) and more machines because they feel they can (6) (low) overall risk.(7) , this doesn't mean that robots beat humans in every aspect. The human contact between doctors and patients is still important. Doctors comfort the patients and give advice (8) guides them through hard decisions while robots are only doing routine tasks, like cleaning and giving tests. (9) might be true that robots have certain advantages (10) humans, but they are still secondary (次要的) to human interaction.12. (2020·山东省青岛市·模拟题) Roofs and windows of buildings aren't the only surfaces that can be used to produce solar power. In China, (1) (construct) has begun of the country's first solar highway, in which solar panels are placed underneath transparent concrete.The solar highway is a 2 km stretch (一段) of road (2) (lie) on the Jinan City Expressway, and it's divided into three layers. The see-through concrete protects a set of solar panels of two (3) (size). Beneath the solar panels (4) (be) a layer that separates them from the damp ground.The road (5) (it) has already been completed, and now it's only a matter of connecting the grid (输电网), (6) is expected to be finished by the end of the year alongside the completion of the Jinan Expressway's south section.This isn't the first solar road China has worked on. Earlier this year, the Qilu Transportation Development Group, also handling the Jinan Expressway solar road, (7) (build) a 160-meter-long solar road in (8) city of Jinan. It has the ability of heating up to keep the highway clear (9) snow and ice and is able to (10) (wireless) charge electric vehicles. The new solar highway is expected to one day be equipped with the same features.13. (2022·广东省潮州市·期末考试) Amazon is publishing a new and improved Kindle. It's (1) (thin) and lighter than the former one, and has a rounded design that makes it easier for one (2) (hold) it with one hand. But what's most interesting is its characters for (3) blind.The previous fourth-generation Kindle Touch, which (4) (come) out in 2011, has speakers, headphone jacks, and text-to-speech functions. It is the last Kindle (5) is accessible to those who have trouble seeing text. When Amazon updated its LCD-screen Fire tablets, the company removed the audio (音频的) character from the Kindle's e-reader line, thus (6) (make) it inaccessible to blind users.The new Kindle will come with Bluetooth wireless technology. Much like Amazon's voice-controlled Echo, the new Kindle reads e-books aloud when (7) (connect) to bluetooth headphones or speakers. How easy it will be for blind people to pair the Kindle with a bluetooth audio device will (8) (true) determine its accessibility. According to Amazon, the new Kindle may have no (9) (difficult) in pairing with bluetooth, as long as the host device has good text-to-speech technology, such as a built-in screen reader.While Amazon isn't the only e-book seller choice (10) blind people, it has a majority share of the US e-book market, according to The journal.14. (2022·北京市·专项测试) The future of driverless cars is fast becoming (1) reality. All the major car companies have plans to produce them-BMW, for example, have announced that they arelaunching a self-driving model in 2021.But drivers of the first self-driving cars won't be able to relax and watch a video. (2) (fortune), these cars can still get (3) (confuse) about what they're "seeing", and a human driver will need to take control sometimes. This is clearly necessary-the test driver of an early Tesla car on Autopilot (4) (die) in a crash while watching a Harry Potter DVD.Accidents such as these may cause people to reject the idea of the driverless cars altogether. (5) , it's predicted that driverless cars will reduce accidents (6) 90%, and so millions of deaths could be avoided in future.Most experts agree that we are not going to have true driverless cars on our roads (7) after 2030. Even then, it won't be possible to drive anywhere you want. Driverless cars need digital maps with extreme (8) (accurate), and it's not easy to produce these for all areas, particularly in the countryside.(9) problem is that self-driving cars can be too careful. They won't take enough risks and might wait too long for clear (10) (open) in the traffic, which could cause even bigger traffic jams!。

Wireless Networks

Wireless Networks

Wireless NetworksWireless networks have become an integral part of our daily lives, providing us with the convenience of accessing the internet and communicating with others without the constraints of physical cables. However, as with any technology, wireless networks come with their own set of challenges and problems that need to be addressed. In this response, I will explore some of the common issues related to wireless networks, including security concerns, connectivity problems, and the impact of wireless technology on our health and environment. One of the most pressing concerns when it comes to wireless networks is security. With the increasing prevalence of cyber attacks and data breaches, ensuring the security of wireless networks has become more important than ever. Hackers can easilyintercept wireless signals and gain unauthorized access to sensitive information, posing a significant threat to individuals and organizations alike. As such, it is crucial for users to implement strong encryption and authentication measures to protect their wireless networks from potential security breaches. In addition to security concerns, connectivity problems are another common issue that users may encounter with wireless networks. Wireless signals can be affected by various factors such as distance, physical obstructions, and interference from other electronic devices, leading to slow or unstable connections. This can be particularly frustrating for individuals who rely on wireless networks for work or leisure activities, as it can disrupt their productivity and overall experience. To address connectivity issues, users can consider optimizing their wireless router placement, investing in signal boosters, or upgrading to a more advanced wireless technology such as Wi-Fi 6. Furthermore, the widespread adoption of wireless technology has raised questions about its potential impact on our health and the environment. Some individuals are concerned about the long-term effects of exposure to electromagnetic radiation from wireless devices, while others worry about the environmental impact of discarded electronic waste from obsolete wireless equipment. While research on the health effects of wireless technology is ongoing, it is important for users to exercise caution and moderation in their use of wireless devices, as well as to properly dispose of electronic waste through recycling programs to minimize their environmental footprint. From a businessperspective, wireless networks also present unique challenges for organizations. With the growing trend of remote work and the increasing reliance on wireless connectivity in the workplace, businesses need to ensure that their wireless infrastructure can support the demands of a distributed workforce. This includes providing secure and reliable wireless access to company resources, as well as implementing policies and procedures to mitigate the risks associated with remote access and wireless communication. Additionally, businesses must also consider the scalability and future-proofing of their wireless networks to accommodate the evolving needs of their workforce and the advancements in wireless technology. In conclusion, wireless networks have undoubtedly revolutionized the way we connect and communicate in the digital age. However, they also bring forth a myriad of challenges that need to be addressed, ranging from security and connectivity issues to concerns about health and environmental impact. By staying informed about best practices for securing wireless networks, taking steps to optimize connectivity, and being mindful of the potential implications of wireless technology, users and organizations can navigate these challenges and continue to benefit from the convenience and flexibility that wireless networks offer.。

Communication Systems

Communication Systems

Communication SystemsCommunication systems are an integral part of our daily lives, playing acrucial role in connecting individuals, businesses, and communities. These systems encompass a wide range of technologies, including telecommunication networks, internet services, and wireless communication devices. While these systems have revolutionized the way we communicate, they also pose several challenges andissues that need to be addressed. One of the primary problems with communication systems is the issue of reliability and consistency. In today's fast-paced world, individuals and businesses rely heavily on communication systems to stay connected and conduct their operations. Any downtime or disruption in these systems can lead to significant consequences, including financial losses, missed opportunities, and a breakdown in essential services. Therefore, ensuring the reliability and resilience of communication systems is of utmost importance. Another significant problem with communication systems is the issue of security and privacy. With the increasing reliance on digital communication channels, the risk of cyber-attacks, data breaches, and unauthorized access has also grown. This poses a severe threat to sensitive information, personal privacy, and national security. As such, thereis a pressing need to develop robust security measures and protocols to safeguard communication systems from potential threats. Furthermore, the issue of accessibility and inclusivity is another challenge that communication systems need to address. While advancements in technology have made communication more accessible, there are still significant barriers for individuals with disabilities, the elderly, and those in remote or underserved areas. Bridging this digitaldivide and ensuring that communication systems are inclusive for all individualsis essential for creating a more equitable and connected society. Moreover, the rapid evolution of communication systems also presents a problem of obsolescence and compatibility. As new technologies emerge and existing ones become outdated, there is a constant need to upgrade and adapt communication systems to ensure compatibility and interoperability. This not only requires significant investments but also poses logistical and operational challenges for businesses and service providers. In addition to these technical challenges, communication systems also face social and ethical issues. The widespread use of communication platforms andsocial media has raised concerns about misinformation, online harassment, and the impact of digital communication on mental health. Balancing the benefits of connectivity with the ethical and social implications of communication systems is a complex issue that requires careful consideration and action. Finally, the environmental impact of communication systems is a growing concern. The energy consumption and electronic waste generated by communication infrastructure and devices contribute to environmental degradation and carbon emissions. Finding sustainable and eco-friendly solutions for communication systems is imperative for minimizing their ecological footprint and mitigating the impact on the planet. In conclusion, while communication systems have revolutionized the way we connect and interact, they also present a myriad of challenges that need to be addressed. From technical issues of reliability, security, and compatibility to social and ethical concerns, communication systems require comprehensive solutions that prioritize accessibility, inclusivity, and sustainability. By acknowledging and tackling these problems, we can ensure that communication systems continue to serve as a catalyst for progress and connectivity while mitigating their negative impacts on individuals, society, and the environment.。

高考语法填空名校好题热点时事100篇:专题 04 5G技术(新科技) (原卷版)

高考语法填空名校好题热点时事100篇:专题 04  5G技术(新科技) (原卷版)

专题04 5G技术(通信高科技)英语语法填空名校好题热点时事100篇1.【福建省福州市八县(市)一中2022学年高二联考英语试题】阅读下面短文,在空白处填入1个适当的单词或括号内单词的正确形式。

A 5G-enabled, driver-less minibus____1____(recent) caught the attention of dozens of people in Beijing eager to get a look and try it out by making purchases.Simply by____2____(wave) their hands, buyers in the crowd at Shougang Industrial Park in Shijingshan district could summon (召唤) the unmanned minibus to stop near them. Consumers could push a virtual button on the vehicle’s screen____3____(buy) more than 20 items such as water or souvenirs from the Beijing 2022 Olympic and Paralympic Winter Games.When the minibus is not around, buyers can place____4____order on their smartphones. The vehicle then drives____5____(it) to them. Behind this futuristic mobile retail store is a 5G-enabled, intelligent vehicle networking system deployed (部署) in the industrial park ____6____several events of the Winter Olympics will take place. It is just one of the 5G-enabled, cutting-edge applications that are being tested as the sports event approaches. ____7____the support of 5G and cloud technologies, many things can be accomplished in afar____8____(easy) manner.China Unicom said the core features of a smart Olympics include____9____(safe), artificial intelligence technologies and energy reduction. The company_____10_____(be) also the official telecommunications service provider during the 2008 Beijing Summer Olympics.2.【湖北省鄂南高中等十一校2022学年联考英语试题】阅读下面短文,在空白处填入1个适当的单词或括号内单词的正确形式。

电子信息专业英语第十三课

电子信息专业英语第十三课

机械与电子工程学院
电子信息教研室
三、 疑难解析
机械与电子工程学院
电子信息教研室
专业英语
3、Two models of wireless LAN As shown in Fig 13-4, IBSS is a set of stations that
communicate with one another directly. There is no connection to a wired network, only mobile stations. It is short-lived network.
机械与电子工程学院
model模型 cable电缆 reliable可信的 subscriber用户 interference干扰 loss损耗 security安全 distance 距离 noise噪声
电子信息教研室
二、 课文翻译讲解
专业英语
As shown in Fig 13-1, wireless networks in our lives can be seen everywhere. For example, after we shopped in the supermarket, the cashier needed to swipe the price and calculate how much we must pay. In fact, that is one kind of wireless network. Generally speaking, wireless LAN is not a cable network. We just need to install PC card on the notebook computer or PC, we could move free but still keep persistent connections with the net over the wireless network coverage area. Wireless LAN is not used to replace the cable networks, but as an extension of wired networks.

MNMU-RA

MNMU-RA

Wireless Sensor Network, 2012, 4, 162-166doi:10.4236/wsn.2012.46023 Published Online June 2012 (/journal/wsn)MNMU-RA: Most Nearest Most Used Routing Algorithm for Greening the Wireless Sensor NetworksHafiz Bilal Khalil, Syed Jawad Hussain ZaidiSchool of Electrical Engineering & Computer Sciences, National University of Sciences and Technology, Islamabad, PakistanEmail: {10mseetkhalil, 10mseejzaidi}@.pkReceived February 22, 2012; revised March 22, 2012; accepted April 10, 2012ABSTRACTWireless sensors are widely deployed in military and other organizations that significantly depend upon the sensed in-formation in any emergency situation. One of the main designs issues of the wireless sensor network (WSN) is the con-servation of energy which is directly proportional to the life of the networks. We propose most nearest most used rout-ing algorithm (MNMU-RA) for ad-hoc WSNs which vitally plays an important role in energy conservation. We find the best location of MNMU node for energy harvesting by apply our algorithm. Our method involves the least number of nodes in transmission of data and set large number of nodes to sleep in idle mode. Based on simulation result we shows the significant improvement in energy saving and enhance the life of the network.Keywords: Energy Efficiency; Wireless Sensor Networks; Routing1. IntroductionThe growth in wireless sensor networks and its applica- tions dramatically increased in last decade. Wireless sen- sor nodes are widely used in military surveillance, intel- ligence and targeting in war operations. Energy available at each sensor for sensing and communications is limited because of the cost constraints and smaller size, which affects the sensor application and network lifetime. The purpose of green networking is to overcome the carbon foot print, reduce the energy consumption and energy losses. Energy efficiency is an important issue to enhance the life time of the network. To achieve the green net- working every component of the network is integrated with energy efficient protocols, e.g., energy-aware rout- ing on network layer, energy-saving mode on MAC layer, etc. One of the most important components of the sensor node is the power source. In sensor networks generally there are three modes of power consumption: sensing, data processing, and communication. Compared to sensing and data processing, much more energy is required for data communication in a typical sensor node [1]. These are also categorized as sleep (idle) and wakeup (trans-mission) mode.In ad-hoc WSNs (Wireless Sensor Networks) always the nodes are cooperative, they sense and transmit their own data and also act as router to route the sensed infor- mation of other nodes towards the data center or gateway node which is connected to the internet. Most of the nodes consumed their power resource while transmitting the data of neighboring nodes. The scope of this paper is to minimize the power consumption in transmitting or routing process and set large number of nodes into sleep mode. The remaining sections of this paper organized as follows. Section 2 explains related work and current en-ergy efficient techniques for sensor networks. Section 3 introduces some problems and research issues in current work. Section 4 describes overview of network model, our proposed algorithm and proposed solution respec-tively. In Section 5 experiment, Results and comparisons are given.2. Related WorkEnergy efficiency is already achieved by many appro- aches. These approaches include energy aware protocol development and hardware optimizations, such as sleep- ing schedules to keep electronics inactive most of the time, dynamic optimization of voltage, and clock rate. In[2] Smart Dust motes are designed that are not more thana few cubic millimeters. They can float in the air, keep sensing and transmitting for hours or days. In [3] authors described the µAMPS wireless sensor node, it is hard- ware based solution in which they simultaneously con- sider the features of the microprocessors and transceivers to reduce the power consumption of the each wireless sensor node in network. Routing algorithms also play an important role to reduce the energy consumption during the routing of data. A lot of work is done in MAC layer and Mac protocols;MAC protocol for wireless sensorH. B. KHALIL, S. J. H. ZAIDI163networks is not like the traditional wireless MACs such as IEEE 802.11. One of the most important goals is en-ergy conservation, fairness and latency is less important [4].SMAC/AL (Sensor MAC with Adaptive Listening) is a famous MAC protocol for WSNs proposed by Ye et al. [5,6]. Main purpose of SMAC/AL is to reduce energy consumption. But in SMAC/AL without considering the distance among the nodes, all nodes unnecessarily con- sume the energy by transmitting information with con- stant power level. An energy efficient MAC protocol with adaptive transmit power scheme named ATPM (Adap- tive Transmit Power MAC) is proposed in [7]. By meas- uring the received power ATPM can calculate the dis- tance between the sender and the receiver, and then adap- tively choose the suitable transmit power level according to the propagation model and distance. The ATMP can not only conserve the energy source, but also decrease the collision probability. A Novel Clustering Algorithm for Energy Efficiency in Wireless Sensor Networks (AN-CAEE) has been proposed [8]. It minimizes energy utili-zation during data transmission and energy consumptions are distributed uniformly among all nodes. Each cluster contains cluster head, each node send its data to cluster head with single hop transmission. And cluster transmits the combined data to the base station with multi hope transmission. This approach reduces energy consumption of nodes within the cluster.3. Problem StatementSensor nodes which are one hope away or closest to the gateway node always consume their power more quickly than others because they have to transmit the data of other nodes in addition to transmission of their own sensed information. In [9] a solution was proposed for such type of scenario by implementing the multiple base stations and periodically changing their positions. But the prob- lem is that if every time the most far away sensor trans- mits its data then major part of overall network energy will be consumed. Another solution for prolong the sen- sor network lifetime is to divide sensors nodes into dis- joint sets, such that all the targets completely covered by every set [3]. Authors consider that within an active sen- sor’s operational range a target is covered. These disjoint sets are activated in round robin fashion, such that at a time only one set is active. Sensors are into the active state in an active set and all other sensors are in a low- energy sleep state. According to this method almost half of the sensor remains active and remaining half goes to sleep mode which reduce energy down to 50%. To make it more efficient and conserve the larger amount of en- ergy we proposed an algorithm named as MNMU-RA (Most nearest most used routing algorithm). That algo- rithm finds the efficient placement of active sensor nodes and set other nodes into sleep mode. An issue is also re- solved by our algorithm, reducing the number of multiple base stations by finding out the best location for the base station without changing its location periodically.4. Synopsis of Our Network ModelIn this paper we deal with the issue of energy efficiency in wireless sensor networks for surveillance of a set of targets with known locality. Scenario of the network is chosen for armed forces purposes like surveillance of the boarder, battle fields and no go areas to acquire the in- formation about enemies and their locations without tak- ing the risk for human personal. We consider that a large number of sensors are distributed randomly in close prox- imity for monitoring and send the monitored information to a gateway node. All nodes are static and makes ad-hoc wireless sensor network. Every sensor nodes must moni-tor the area all the time in its operational range and each sensor has fixed transmission range. In network model we assume that each sensor has unique pre configured Id and Global/proactive routing algorithms are used. Main advantage of proactive algorithm is not route latency but drawback is the high maintenance overhead when many of the routes are never used.Proactive routing is appro-priate for networks with: Small size, low mobility and high communication rates. We proposed an algorithm called as most nearest most used routing algorithm for this purpose. By using MNMU-RA we can find the per-fect location of node for energy harvesting which also reduce the overall energy consumption and cost.4.1. Most Nearest Most Used Routing Algorithm Run shortest path routing algorithm or link state routing to find the shortest path for each node in the wireless sensor network. Calculate all the possible shortest paths for each node. Then find the MNMU node (Figure 1).∙ A node which is most nearest to the gateway node.∙Select a node which is used in maximum number of shortest paths.Figure 1. Location of selected MNMU node.H. B. KHALIL, S. J. H. ZAIDI 164In above network model we assumed that sensed in- formation is equally probable for all the nodes. Then we calculate the shortest path for the nodes A, B and C. Then we find out the nodes which are most nearest to the gate way node. In above network model there are only two nodes X and Y which are closer to the gateway node. Then for selection we give the preference to the node which is most used in shortest paths. In above model Y is node which is most used in all shortest paths. If nodes A, B and C transmit their data the entire time node Y will be included in their path. Then every node keeps its routes information towards the node Y for future communica- tions. Flow chart of our algorithm is given in Figure 2. 4.2. Proposed SolutionWe used our algorithm to find most nearest most used node in a network, that node should be active all the time while other sensors remain in sleep mode and keep sens- ing. As we use proactive routing so each sensor knows its path towards the MNMU node. If a node has to send its information before sending it will wake up the nodes along his route. When MNMU nodes receive the infor- mation it will forward the data to the gateway and sets all the nodes into sleep mode. The critical issue in this solu- tion is that if a node (MNMU node) remains active all the time then its energy source will be empty soon. We re- solve this issue by using the energy harvesting concept at MNMU node [1]. We can also use secondary batteryFigure 2. MNMU routing algorithm flow chart. which is rechargeable and coupled with photovoltaic cell[10]. If all the nodes can generate energy from light, vi-bration, heat etc [11,12] it will increase the system cost.We don’t need to replace all the nodes with secondary sources. By replacing only one node (MNMU node) re-solves the issue and slightly increases the cost of theoverall system. But effectively prolong the life time ofsensor network. A solution given by Gandham et al. [9]can be more energy efficient if we implement our pro-posed algorithm with every new location of mobile basestation. Split the network in equal parts and periodicallychange the position of base station in each part. Basestation can be easily implemented at the place of MNMUnode in each part of the network instead of replacing itoutside the network. MNMU node will reduce the multihop and number of transmission which directly reducethe energy consumption.5. ExperimentWe done the experiment by implementing our proposedalgorithm in a network and calculate the amount of en-ergy utilization using MATLAB. Then implement theconcept of disjoint set and analyze the values at same network. For simulation 20 nodes containing one gate-way node are distributed randomly in 30 meter squarearea. We consider the features of MICA2 mote platform.It is third generation mote specifically built for WSNs [4].MICA2 have selectable transmission power range whichoffers adjustable communication ranges, selected trans-mission range for each node is 10 meters. The packetlength is fixed at 200 bits. MICA2 usually operated with3 V battery and other features mentioned in Table 1.We divided our analysis in three parts; first we calcu-late the power consumption using disjoint sets methods[3], then we apply our algorithm and calculate & com-pare power consumption. Same network and topologytaken in which each node remains active all the time andno energy saving protocol and technique is implemented.Energy calculated during the 20 rounds, all nodes areactive in first five rounds in which they sense and trans-mit the data. After ten rounds there is no activity andnodes go to sleeping mode according to implemented Table 1. Features of MICA2 motes platform [12,13].Operation/Features UnitListening 8mA Receiving 10mA Transmission 17mA Sleep 19µA Radio Frequency 900 MHzCPU 8 bit Atmel at 8 MHzBandwidth 40KbpsH. B. KHALIL, S. J. H. ZAIDI165methodology. Calculated results are given in Figures3 and 4.Simulation ResultsFigure 3 shows the result comparison of energy con- sumption in different modes; sensing, Transmission and sleeping of network. In Figure 3(a) set of all the active nodes shown by blue line are transmitting the data with- out applying any energy saving protocol. During the transmission if all nodes are active they will keep trans- mitting the information to each other and maximum amount of energy is consumed. In disjoint system only active set take part in transmission and inactive nodesFigure 3. Power consumptions in different modes. (a) Trans- mission mode; (b) Power consume by sleeping nodes; (c)Power consume by active nodes in sleep mode. Figure 4. Result and comparison of energy consumption in different modes.remain inactive during the transmission of active set. Our proposed algorithm gives lowest amount of energy con- sumption because only the MNMU node and less number of nodes take part in transmission. Energy consumed by inactive nodes in sleeping modes is shown in Figure 3(b). Energy consumption of sleeping nodes is in µwatts. Ac- cording to our algorithm 19 nodes set to sleep mode and only one MNMU node is active. While Figure 3(c) shows the separately calculated energy consumption by active nodes when there is no activity and network is in idle mode. Similarly in sleeping mode only MNMU node remains active and rest of the network sets to sleep mode. Figure 4 shows the result of energy consumption of entire network in different rounds. In first 5 rounds we assume that there is no sensed information to send; all the nodes are active in listening mode and keep sensing. In 5 to 10 rounds nodes are transmitting their sensed in- formation to the gateway. After round 10 there is no ac- tivity and nodes set to sleep mode in sleep mode only energy consumed by active nodes are calculated and en- ergy consumed by sleeping nodes which is in µwatts is neglected. Our algorithm gives the minimum energy con- sumption during the transmission in which fewer num- bers of nodes take part in routing and also in sleep mode by keeping only MNMU node active.6. ConclusionWe presented the most nearest most used routing algo- rithm to reduce the energy utilization in wireless sensor networks. Using this algorithm we find the best location of energy harvested node in a network. Our algorithm involves least number of nodes during transmission and keeps one node active in sleep mode. That significantly reduces the energy consumption during the transmissionH. B. KHALIL, S. J. H. ZAIDI 166and sleep mode when there is no activity. An open re- search issue is the heterogeneity of energy resources of the nodes that must be resolved after practical imple- mentation in any network. In our solution there is uneven energy consumption due to the topology of the network and nature of data flow. But that uneven energy con- sumption is helpful to reduce the energy consumption of entire network7. Future DirectionDesired goal in wireless networks is energy efficiency to maximize the network life. Our algorithm can be used to find the location of cluster header quickly in novel clus- tering algorithm for energy efficiency in wireless sensor networks [8]. Further we can implement coding tech- niques to reduce the number of transmissions at MNMU node. Energy consumes per bit or per packet transmis- sion can be reduce. Number of packets can be transmit- ted as a single packet by applying x-or Operations which reduces the energy but may cause of slighter delay. To apply this technique sensor nodes must be smarter and have ability to do this quickly.REFERENCES[1]I. F. Akyildiz, T. Melodia and K. Chowdhury, “A Surveyon Wireless Multimedia Sensor Networks,” ComputerNetworks, Vol. 51, No. 4, 2007, pp. 921-960.doi:10.1016/net.2006.10.002[2]J. M. Kahn, R. H. Katz and K. S. J. Pister, “EmergingChallenges: Mobile Networking for Smart Dust,” Inter-national Journal of Communication Networks, Vol. 2, No.3, 2000, pp. 188-196.[3]M. Cardei and D. Z. Du, “Improving Wireless SensorNetwork Lifetime through Power Aware Organization,”Wireless Networks, Vol. 11, No. 3, 2005, pp. 333-340.doi:10.1007/s11276-005-6615-6[4]Q. Hu and Z. Z. Tang, “An Adaptive Transmit PowerScheme for Wireless Sensor Networks,” 3rd IEEE Inter-national Conference on Ubi-Media Computing, Jinhua, 5-7 July 2010, pp. 12-16.[5]W. Ye, J. Heidemann and D. Estrin, “An Energy-EfficientMAC Protocol for Wireless Sensor Networks,” Proceed- ings of the IEEE INFOCOM, New York, 23-27 June 2002, pp. 1567-1576.[6]W. Ye, J. Heidemann and D. Estrin, “Medium AccessControl with Coordinated Adaptive Sleeping for Wireless Sensor Networks,” IEEE/ACM Transactions on Network- ing, Vol. 12, No. 3, 2004, pp. 493-506.doi:10.1109/TNET.2004.828953[7]Q. Hu and Z. Tang, “ATPM: An Energy Efficient MACProtocol with Adaptive Transmit Power Scheme for Wire- less Sensor Networks,” Journal of Multimedia, Vol. 6, No.2, 2011, pp. 122-128. doi:10.4304/jmm.6.2.122-128[8] A. P. Abidoye and N. A. Azeez, “ANCAEE: A Novel Clus-tering Algorithm for Energy Efficiency in Wireless Sen- sor Networks,” Journal of Wireless Sensor Networks, Vol.3, No. 9, 2011, pp. 307-312. doi:10.4236/wsn.2011.39032 [9]S. R. Gandham, M. Dawande, R. Prakash and S. Venkate-san, “Energy Efficient Schemes for Wireless Sensor Net- works with Multiple Mobile Base Stations,” Global Tele- communications Conference, San Francisco, 1-5 Decem- ber 2003, pp. 377-381.[10]M. A. M. Vieira, C. N. Coelho, D. C. Silva and J. M. Mata,“Survey on Wireless Sensor Network Devices,” Proceed- ings of IEEE International Conference on Emerging Tec- hnologies and Factory Automation (ETFA’03), Lisbon, 16-19 September 2003, pp. 537-544.[11]J. Paradiso and T. Starner, “Energy Scavenging for Mo-bile and Wireless Electronics,” Pervasive Computing, Vol.4, No. 1, 2005, pp. 18-27. doi:10.1109/MPRV.2005.9 [12]V. Gungor and G. Hancke, “Industrial Wireless SensorNetworks: Challenges, Design Principles, and Technical Approaches,” IEEE Transactions on Industrial Electron- ics, Vol. 56, No. 10, 2009, pp. 4258-4265.doi:10.1109/TIE.2009.2015754[13]CrossBow, Mica2 Data Sheet./Products/Product_pdf_files/MICA%20data%20sheet.pdf。

Wireless-Networks(5)

Wireless-Networks(5)

Wireless NetworksWireless networks have become an integral part of our daily lives, providing us with the convenience and flexibility to stay connected from anywhere. However, they also come with their own set of challenges and problems that can impact their performance and reliability. In this response, I will address some of the common problems associated with wireless networks, including interference, security concerns, and connectivity issues, while also discussing potential solutions and best practices to mitigate these issues. One of the most prevalent issues with wireless networks is interference, which can result from various sources such as other electronic devices, neighboring networks, or physical obstructions. This interference can cause disruptions in the wireless signal, leading to slow or unreliable connections. To address this problem, it is essential to identify the source of interference and take steps to minimize its impact. This can involve repositioning the wireless router, using devices that operate on different frequencies, or investing in signal boosters to improve coverage. Another significant concern with wireless networks is security. With the increasing prevalence of cyber threats and attacks, ensuring the security of a wireless network is crucial. Without proper security measures in place, wireless networks are vulnerable to unauthorized access, data breaches, and other malicious activities. To mitigate these risks, it is essential to implement strong encryption protocols, such as WPA2 or WPA3, and regularly update passwords to prevent unauthorized access. Additionally, enabling features such as network segmentation and guest networks can help enhance the overall security posture of the wireless network. In addition to interference and security issues, connectivity problems are also common in wireless networks. Dead zones, where the wireless signal is weak or nonexistent, can be a significant challenge, especially in larger or multi-story buildings. To address this issue, strategically placing wireless access points and repeaters can help extend the coverage area and improve connectivity in dead zones. Furthermore, utilizing mesh networking technology can create a more robust and seamless wireless network by enabling devices to connect to the nearest access point, thereby reducing connectivity issues. Moreover, the increasing number of connected devices in modern households and workplaces canstrain wireless networks, leading to performance issues and slow speeds. This problem, known as network congestion, can be alleviated by upgrading to a higher bandwidth or utilizing advanced technologies such as MU-MIMO (multi-user, multiple input, multiple output) to enable the router to communicate with multiple devices simultaneously. Additionally, optimizing the placement of wireless devices and minimizing the use of bandwidth-intensive applications can help alleviate network congestion and improve overall performance. Furthermore, the rapid advancement of wireless technology and the proliferation of IoT (Internet of Things) devices have introduced new complexities and challenges for wireless networks. The sheer volume of connected devices, each with its unique requirements and demands, can place a strain on the network infrastructure and impact its performance. To address this issue, implementing network management tools and solutions, such as Quality of Service (QoS) settings and device prioritization, can help optimize the network to accommodate the diverse needs of connected devices. In conclusion, wireless networks offer unparalleled convenience and flexibility, but they also come with their fair share of challenges and problems. Interference, security concerns, connectivity issues, network congestion, and the complexities introduced by IoT devices are all significant issues that can impact the performance and reliability of wireless networks. However, by implementing best practices, such as optimizing the placement of wireless devices, securing the network with robust encryption, and utilizing advanced technologies like mesh networking and MU-MIMO, many of these problems can be mitigated. As wireless technology continues to evolve, it is essential for users and organizations to stay informed about emerging challenges and adopt proactive measures to ensure the optimal performance and security of their wireless networks.。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Some security issues of wireless systemsEduardo B. Fernandez1, Saeed Rajput1, Michael VanHilst1,and María M. Larrondo-Petrie11 Dept. of Computer Science & Engineering, Florida Atlantic University,777 Glades Road, Boca Raton, FL 33431-0991{ed, saeed, mike, maria}@Abstract. Wireless systems have found wide acceptance in many industriessuch as military and healthcare. These systems appear under a variety of archi-tectures including fixed networks, cellular networks, and ad hoc networks. Wesurvey some security problems, of interest to researchers, in wireless systemswhen used in these environments. Most studies of the security of these systemsemphasize cryptographic aspects, we concentrate on other security aspects,such as operating systems, access control, web services, and location aware-ness.1 IntroductionWireless systems have found wide acceptance in many industries such as military, healthcare, business, manufacturing, retail, and transportation. These systems appear under a variety of architectures including fixed networks, cellular networks, and ad hoc networks. The challenges posed by the industries to each of these technologies are unique, especially for healthcare and military applications.We survey some security problems in wireless systems. We do not attempt to be comprehensive but to give a general overview of some problems of interest to re-searchers. Most studies of the security of these systems emphasize cryptographic aspects. While important, they are not the only issues and we concentrate on other aspects. Background information about security aspects of wireless systems can be found in [1], [2] ,and [3], and about the structure of the networks and protocols in [4].We start by discussing some general issues that define the context for our discus-sion. Then we consider the effects of the type of industry on application security. Next we talk about access control aspects and the effect of the operating system on security. We look then at web services and end with the effect of location awareness on security.2 General issuesWhen compared to wired networks, there are four generic limitations of all wireless devices: 1) limited power, 2) limited communications bandwidth, 3) limited process-ing power, and 4) relatively unreliable network connection. The bandwidth available to wireless systems is usually at least an order of magnitude less than that available to a wired device. The processing power is limited due to the limited space/cost of fixed wireless devices typically used for Wi-Fi networks, and is further limited due to power constraints in other wireless devices. The unreliability of the network connec-tion is universal in all wireless networks. Protocols have been designed to take this lack of reliability into account and to try to improve it. However, in designing these protocols, choices have to be made about the size of the packets and frames to be used. Such decisions can have a profound impact on the effectiveness and efficiency of cryptographic protocols and other security measures. To this we add the fact that there is a large variety of devices using different architectures, several operating sys-tems, and diverse functionality. On top of everything, security needs for wireless devices are greater than those of regular wired-network devices. This is due to the very nature of their use; they are mobile, they are on the edge of the network, their connections are unreliable, and they tend to get destroyed accidentally or maliciously. These devices can also be stolen, lost, or forgotten. Thus, we need more security processing. Security processing can easily overwhelm the processors in wireless de-vices. This challenge, which is unique to wireless devices, is sometimes referred to as the security-processing gap. Non-fixed wireless devices such as cellular handsets and ad hoc network devices such as sensors are severely handicapped due to their very low battery power. Even though significant advances are expected in computation and communication speed over the next decade, it is still expected that they will lag behind the power available to fixed computers due to the need for miniaturization. To make things worse, only modest improvements to battery power are expected. The battery limitation in mobile wireless devices is sometimes called battery gap and refers to the growing disparity between increasing energy requirements for high-end operations needed on such devices and slow improvements in battery technology.Finally, ad hoc wireless networks have their own security challenges. Due to their extremely small device size (smart dust [5]), their battery life and processing power are further limited. However, security needs are even greater, since some security processing is needed just for the device to be able to function properly and be able to communicate in their routing protocols.When it comes to the general service provider industry (internet and cell phone companies), they are mostly interested in providing cellular service and hotspot ser-vices. While the security issues of cellular networks are relatively well understood, those of Wi-Fi networks are not. Important issues are authentication of users on hot-spots, wireless-hop security (the part of the ISP network that is wireless), and seam-less security association transfer from one domain (e.g. the cellular network) to the other (e.g. the Wi-Fi network). An interesting direction here is authorization of de-vices once authenticated. This has to come from application semantics as we discuss below.With the increase in functions, the typical problems found in larger systems are also appearing in portable devices. One of these problems is viruses [6]. The first portable virus to appear was Liberty, followed shortly by Phage. The WML (Wireless Markup Language), a script language used by WAP can also be a source of possible attacks [7] [8]. The devices do not distinguish between script code resident in thephone from the one downloaded from potentially insecure sites, all of them execute with the same rights. An infected device can be used to launch denial of service at-tacks on other devices or the network. Similarly to wired systems, wireless systems need up-to-date antivirus programs. Companies such as Symantec, McAfee, and Trend Micro have specialized products for handheld devices. A problem here is that in some devices because of space and processing limitations, antivirus programs and other protection devices, such as firewalls and IDS, may not be feasible.3 Applications and securityFor the healthcare industry both Wi-Fi and sensor networks are important. Issues in these networks are similar to the ones we discussed in the previous section in the context of service providers. The difference in this case is that the consequences of an error are severe, especially when it involves wireless bedside monitoring or a dispens-ing device communicating with the server. The area of sensor networks (biometric sensors) is still a research area. When we consider the collection of data from sen-sors, the issues of confidentiality, integrity, and non-interference also arise. HIPAA regulations have brought renewed concern about patient privacy and new models are being proposed [9]. A model defined at the application level, say using UML (Unified Modeling Language), must be mapped to the lower levels of the wireless networks; it is an open problem how to do this in a systematic way. The use of patterns, discussed in the last section, could provide a handle for this mapping.The military has applications for all types of wireless devices. Their need for secu-rity in all areas is more rigorous. However, in their case, survivability of the network is very important, i.e. it is vital that theft or destruction of one device does not com-promise the information stored on that device, or worse, the security of the entire system. In case of ad hoc networks, it is vital that removal of a few nodes does not affect the communication capabilities of the devices, which opens interesting research areas to develop authentication and security protocols that are friendly to such changes. The US Department of Defense recently issued Directive 8100.2 that re-quires encrypting all information sent in their networks according to the rules of the Federal Information Processing (FIP) standard [10]. The provision also calls for anti-virus software. It is interesting to observe that their concern is mostly about message transmission and they don’t seem to be worried about the other aspects of security, such as the ones discussed in this paper. This is also true for the NIST recommenda-tions for wireless security in federal agencies. Apparently they were considering only simple applications; however, the increasing use of web services opens up many new possibilities for military uses, including battlefield communications, sensor networks, and soldier location and identification.Another important application is mobile e-commerce. This includes mobile bank-ing, wireless payment services, shopping, reservations, and many others. Many of the required functions can be secured using cryptography (see [11] for a survey), but access to specific services requires at least some type of Role-Based Access Control (RBAC), as discussed below.4 Access control to sensitive information in or through the device We should consider access control to:•Resources in the device. The portable device may contain files that need to be re-stricted in access and it is the function of its operating system to perform this control. Control of types of access is important; for example, a user may play a song, but she should not copy it. This type of control can complement other types of digital rights management. The device may contain passwords to access net-works, encryption keys, lists of people, etc.; all this data needs protection. •Resources provided by other mobile network devices. This is the most interesting case for research. Because of the variety and unpredictability of potential users, access decisions must be based on attributes (roles, groups, qualifiers) and trust [12, 13]. For the same reasons and because of the variety of resources, rights must be created dynamically [14, 12]. In addition, it is not clear where the access rights should be kept because of the lack of a centralized repository for authori-zation rules (no device can hold large tables) [14].•Resources in wired networks. When portable devices need to access application-related data from corporate databases some type of Role-Based Access Control (RBAC) may be necessary. Management and enforcement of application and in-stitution constraints can be performed following PMI (Privilege Management In-frastructure) [15]. PMI is a standard of ITU X.509. There is some work on RBAC models that integrate the wireless access with access from the wired net-work users. One of these papers [16] uses a hierarchic role structure, which doesn’t appear as very useful for practical situations because it is not easy to build meaningful hierarchies for complex applications. More flexible models are needed.5 Operating systemsPortable devices have evolved from having ad hoc supervisors to standard operating systems. Some systems use the Java run-time system as supervisor. High-end cell phones run complete operating systems such as Palm OS (now being replaced by Cobalt), Microsoft Windows CE (renamed PocketPC), Symbian, or Linux; and pro-vide IP networking capabilities for web browsing, email and instant messaging. Some typical security features include:• A unique device identifier – this can be accessed by applications.• A kernel configuration with enhanced protection – this allows the use of the protected kernel mode, instead of the full-kernel model.•Digital authentication in the dial-up boot loader – the dial-up boot loader isa program in ROM used to upgrade the OS image file (NK.bin) using flashmemory or a remote server. The OS image file should be signed using digi-tal encryption to verify its integrity before it is downloaded.In addition, these operating systems include support for the standard cryptographic protocols.The security of the operating system is fundamental for any system because it con-trols all the resources and provides support for the execution of applications. There is an overemphasis on cryptography, while aspects such as memory protection and file authorization have been neglected in most products, although this is changing (Cobalt includes memory protection). Memory protection is important in the creation of com-partments to stop the propagation of viruses, while as mentioned above, file authori-zation is necessary to protect cryptographic keys and to enforce digital rights man-agement. Downloaded contents, such as music, wallpaper, and games need to be protected. Current devices have no protection or protection based on cryptographic means. The study of these aspects provides a potentially fruitful research direction, in particular protection of digital rights without resorting solely to cryptography.6 Web servicesA web service is a component or set of functions accessible through the web that can be incorporated into an application. Web services expose an XML interface, can be registered and located through a registry, communicate using XML messages, and support loosely-coupled connections between systems. Web services represent the latest approach to distribution and are considered an important technology for busi-ness integration and collaboration. Figure 1 shows the architectural layers of web services architectures. Each layer is regulated by a variety of security standards [17].Wireless devices can access web services using SOAP (Simple Object Access Pro-tocol) but web services still are not widely used in portable devices. The limited proc-essing power of portable devices and the lack of network reliability are a serious obstacle for a full implementation. However, using appropriate gateway middleware, it is possible for portable devices to access web services. Most access to web services from mobile devices now goes through a WAP gateway and most of the use of web services for mobile systems is now between servers [18]. However, this situation is changing and predictions indicate that web services in cell phones will be arriving soon [19] [20] [21]. In fact, Nokia just announced a Service-Oriented Architecture for smart mobile phones [22]. Security will be an important issue for this generation of smart and complex devices.The richness of web services brings along a new set of security problems [17]. All the attacks that are possible in wired systems are also possible in wireless systems using web services, e.g., viruses, buffer overflow attacks, message interception, de-nial of service, etc. Web services introduce several extra layers in the system architec-ture and we have to consider the unique security problems of these layers. Since these are layers that run on top of the platform layers, the security of the platforms is still fundamental for the security of the complete system. Wireless systems using web services have to face, in addition, the general vulnerabilities of wireless networks and may also add new security problems to these networks, although this aspect has not been explored in detail. There is also a variety of standards for web services security and a designer of wireless devices should follow at least the most important ones to be able to have a credibly secure system. On the other hand, the extra layers bring more flexibility and precision for security; for example, encryption can be applied atthe XML element level, authorization can be applied to specific operations in a web service interface. This greater security precision allows applying policies in a finer and more flexible way.Web services make possible convenient implementations of location-based ser-vices, where information is pushed to the device depending on its location. We dis-cuss below additional problems that may occur in that case.7Location awarenessBecause mobile devices are usually connected to networks, it is possible to track their position. For example, the US Federal Communications Commission mandates that cell phones must be able to be located within 300 meters of their actual location. In some cases the user of the device may want others to know her whereabouts but in other cases she might not [23]. Even in the first case, only authorized persons should have access to location information. That means that we need to control access to location information. This is another aspect of access control, related to the discus-sion in Section 4. Ease of determining location also raises privacy concerns [24] [25].Location can also be used to get access to physical resources; for example, doors in a building could be controlled depending on the location of an authorized user. In some cases nomadic users may want to access the resources provided by some physi-cal devices, e.g., printers or storage devices. A device may establish its web presence through physical registration [26]. The position of the user is important to decide which resources would be more convenient for him to access.Location can be absolute or relative. Examples of absolute location are geospatial representation (typically longitude and latitude) or civic (address, city, region, coun-try). The position of the mobile entity with respect to other known locations is an example of a relative location.Work on this area requires finding new models of access control based on location information, as well as standard characteristics such as roles, certificates, and identity. For example, access control to location information may need to be performed in a distributed way [27] [14]. An overview of access control situations is given in [28]. Another direction is finding ways to preserve privacy; for example, [14] proposes the use of logical borders and anonymous IDs, based on the concept of personal profiles and context-aware agents, and [29] considers preventing unnecessary information to be disclosed to third parties. Contexts are important for privacy and access control. A context is an evolving, structured, and shared information space [30].8 ConclusionsThere is serious concern about the vulnerabilities of wireless systems. The easy ac-cess to the medium by attackers is a negative aspect, compounded by the design er-rors in the early protocols [31] [32] [33]. It is true that Wi-Fi is becoming more secure and Bluetooth appears reasonably secure but they (and WAP) cover only some of thesecurity layers. A basic security principle indicates that security is an all-layer prob-lem, securing one or more layers is not enough [34]. With some of the layers still insecure, it is not possible to have true security.Third generation systems will have voice quality that is comparable to public switched telephone networks. Voice over IP over WiFi will bring its own set of secu-rity problems. In addition, the new systems will have higher data rates, symmetrical and asymmetrical data transmission rates, support for both packet and circuit switched data services, adaptive interface to the Internet to reflect common asymme-try between inbound and outbound traffic, more efficient use of available spectrum, support for wide variety of mobile equipment, and more flexibility. All of these are the potential sources of new security problems. The pervasiveness of mobile devices makes their users want them to work together. For example, a cellular phone extract-ing phone numbers from a PDA or a digital camera storing its pictures in a laptop. This will lead to new interoperable architectures [35], which in turn, will bring new security problems. The proliferation of small devices in all places leads to ubiquitous computing, security issues for that environment are discussed in [36]. Anonimity, traceability, and traffic analysis are aspects that will become more important in that environment and they are all related to the protection of the metadata of the wireless structure. Usability of the security interfaces is another possible problem due to the limited sizes of these interfaces [8].We have indicated some aspects that offer promising avenues for future work. We are working on some of these issues but there are several areas that appear neglected and could be a good source of ideas for future research. A general approach that ap-pears promising is the use of security patterns, which can help designers build secure systems [34]. Several patterns have been found in the Bluetooth architecture, includ-ing versions of the Broker, Layers, Lookup, and Bridge patterns [37]. Some patterns for ubiquitous computing have appeared [38]. However, no specific security patterns for wireless systems have been described. Patterns are part of the more general area of software architecture and the methods and approaches of that area should be more explored for possible use in security [39].AcknowledgementsThis work was supported by a grant from the Defense Information Systems Agency (DISA), administered by Pragmatics, Inc. Tami Sorgente, Alvaro Escobar, and Andrei Bretan provided valuable comments that helped improve this paper.F i g u r e 1. W e b s e r v i c e s a r c h i t e c t u r a l l a y e r sReferences1. Fernandez, E. B., Jawhar, I., Larrondo-Petrie, M. M., and Van Hilst, M.: An overview ofthe security of wireless networks. In: Ilyas, M. (ed.): Handbook of Wireless LANs, CRC Press (2004)2. Rajput, S.: Wireless security protocols. In: Ilyas, M. (ed.): Handbook of Wireless LANs,CRC Press (2004)3. Elliot, G. and Phillips, N.: Mobile commerce and wireless computing systems, Addison-Wesley, 2004.4. Stallings, W: Wireless Communications and Networks, Prentice-Hall (2002)5. Warneke, B., Last, M. Liebowitz, B. and Pister, K.S.J.: Smart dust: communicating with acubic- millimeter computer. In: Computer, IEEE, January (2001)6. Foley, S. and Dumigan, R.: Are handheld viruses a significant threat? In: Communicationsof the ACM, Vol. 44, No 1 (2000) 105-1077. Ghosh, A.K. and Swaminatha, T.M.: Software security and privacy risks in mobile e-commerce. In: Communications of the ACM, Vol. 44, No. 2 (2001) 51-578. Josang, A., and Sanderud, G.: Security in mobile communications: Challenges and oppor-tunities. In: Proceedings of the Australasian Information Security Workshop (2003)9. Fernandez, E. B., Larrondo-Petrie, M. M., and Sorgente, T.: Security Models for Medicaland Genetic Information. In: Proceedings of the IADIS International Conference (e-Society 2004), Avila, Spain, July 2004, (2004) 509-51610. /whs/directives/corres/html/81002.htm11. Thanh, D.V.: Security issues in mobile eCommerce. In: Proceedings of the 1st InternationalConference on Electronic Commerce and Web Technologies (EC-Web 2000), Vol. 1875, Springer Verlag (2000) 467-476.12. Kagal, L., Finin, T., and Joshi, A.: Trust-based security in pervasive computing environ-ments. In: IEEE Computer, December 2001, (2001) 154-157.13. Zhang, K., and Kindberg, T.: An authorization structure for nomadic computing. In: Pro-ceedings of SACMAT’02, ACM (2002) 107-113.14. Di Pietro, R. and Mancini, L.V.: Security and privacy issues of handheld and wearablewireless devices. In: Communications of the ACM, Vol. 46, No. 9 (2003) 75-7915. Chadwick, D.W.: An X509 role-based PMI, (2001)/files/article1_chadwick.pdf16. Lee, Y.R. and Park, D.G.: The ET-RBAC-based privilege management infrastructure forwireless networks. In: Proceedings of EC-Web (2003) 84-9317. Fernandez, E.B., Sorgente, T. and Larrondo-Petrie, M.M.: Web services security: Stan-dards and research issues, in preparation.18. Gralla, P.: Mobile web services: Theory vs. reality. , 10February 2004.19. Pilioura, T., Tsalgatidou, A. and Hadjiefthymiades, S.: Scenarios of using web services inM-commerce. In: ACM SIGecomm Exchanges, Vol. 4, No 4, January 2003, 28-3620. Yuan, M.J.: Access web services from wireless devices. In: Java World, August 2002,/javaworld/jw-08-2002/jw-0823-wireless.html21. Yuan, M. J.: Securing wireless J2ME: Security challenges and solutions for mobile com-merce applications. In: IBM DeveloperWorks, IBM, 1 June 2002/developerworks/wireless/library/wi-secj2me.html22. Yuan, M.J. SOA and web services go mobile, Nokia-style, 6 July 2004,/story/?storyid=45531&DE=123. Dogac, A. and Tumer, A.: Issues in mobile electronic commerce. In: Journal of DatabaseManagement, Jan.-March (2002) 36-4224. Hong, J.I., and Landay, J.A.: An Architecture for privacy-sensitive ubiquitous computing.In: Berkeley EECS Annual Research Symposium, Berkeley, California, 24 February 2004;/BEARS/STARS.html25. Schilit, B. Hong, J. Gruteser, B. M.: Wireless Location Privacy Protection. In: IEEE Com-puter, December 200326. Barton, J., Kindberg, T., and Sadalgi, S.: Physical registration: Configuring electronicdirectories using handheld devices. In HPL-2001-119, Hewlett-Packard Co. (2001) /techreports/2001/HPL-2001-119.pdf27. Hengartner, U. and Steenkiste, P.: Implementing access control to people location informa-tion. In Proceedings of SACMAT’04 (2004) 11-2028. Larrondo-Petrie, M. M., VanHilst, M., Ferrnandez, E.B., Escobar, A., and Bretan, A.:Location-based access control, submitted for publication.29. Gorlach A., Heinemann, A., and Terpstra, W.W.: Survey on location privacy in pervasivecomputing. In: Proceedings of 1st Workshop on Security and Privacy at the Conference on Pervasive Computing (SPPC), Vienna, April 2004.30. Coutaz, J., Crowley, J.L., Dobson, S., and Garlan, D.: Context is key. In: Communicationsof the ACM, Vol. 48, No. 3, March 2005, (2005) 49-53.31. Arbaugh, W.: Wireless security is different. In: Computer, IEEE, August 2003, 99-102.32. Juul, N.C., and Jorgensen, N.: WAP may stumble over the gateway (security in WAP-basedmobile commerce). http://www.dat.ruc.dk/~nielsj/research/papers/wap-ssgrr.pdf33. Saarinen, M.-J.: Attacks against the WAP WTLS protocol. In: Proceedings of Communica-tions and Multimedia Security (1999) http://www.jyu.fi/~mjos/wtls.pdf34. Fernandez, E.B.: A methodology for secure software design. In: Proceedings of the 2004International Conference on Software Engineering Research and Practice (SERP’04), Las Vegas, NV, 21-24 June 200435. Schilit, B.N., and Sengupta, U.: Device ensembles. In: IEEE Computer, December 2004,56-64.36. Stajano, F.and Anderson, R.: The resurrecting duckling: Security issues for ubiquitouscomputing. In: Security & Privacy 2002, Supplement to IEEE Computer, Vol. 35, No. 4, April 2002, (2002) 22-26. /security/supplement1/sta/37. Gamma, E., Helm, R., Johnson, R., Vlissides,J.: Design Patterns: Elements of ReusableObject-Oriented Software, Addison-Wesley, Boston, MA (1995).38. Landay, J.A., and Borriello, G.: Design patterns for ubiquitous computing, In: Computer,IEEE, Vol. 36, No. 8, August 2003 (2003) 93-95.39. Medvidovic, N., Mikic-Rakic, M., Mehta, N.R., and Malek, S.: Software architecturalsupport for handheld computing. In: IEEE Computer, Vol. 36, No. 9, September 2003, (2003) 66-73.。

相关文档
最新文档