scholarly journals Mobile Internet Information Security Analysis and Countermeasures

Author(s):  
Yongbin Zhu ◽  
Li Yan ◽  
Junsheng Li
2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Xiaolong Zhang ◽  
Wei Wu

Due to the complexity of wireless communication networks and the open nature of wireless links, complex upper layer network encryption cryptographic algorithms are also difficult to implement effectively in complex mobile wireless communication and interconnection networks, and traditional cryptography-based security policies are gradually not well able to meet the security management needs of today’s mobile Internet information era. In this paper, the physical characteristics of the channel in the wireless channel are extracted and used to generate keys, and then, the keys are negotiated so that the keys generated by the two communicating parties are identical. Then, the generated keys are used by the communicating parties to design the interleaving matrix for encryption of the message. The false bit rate of the system is investigated for the case of an interleaving matrix generated using different quantization methods of keys. The problem of characterizing the encoding and encryption techniques for interleaving keys for the physical layer sensing antenna arrays of wireless channels is studied in depth. The physical layer wireless channel interleaving technique and the wireless channel physical layer encryption technique are organically combined, and a joint interleaving encryption method based on the physical layer key of the wireless channel is designed and used to encrypt and randomize the physical layer data information of the OFDM (Orthogonal Frequency Division Multiplexing) system, which improves the security and reliability of the wireless channel information transmission. The effect of physical layer keys under different physical layer quantization methods on the performance of the wireless channel interleaving encryption algorithm is studied, and the quantization methods of pure amplitude, pure phase, and joint amplitude phase are investigated for the characteristics of wireless physical layer channels.


2015 ◽  
Vol 8 (25) ◽  
Author(s):  
Joon Tae Ahn ◽  
Soonsuk Kim ◽  
Junghan Lee ◽  
Myung Gon Kim ◽  
Gil Hong Park ◽  
...  

2021 ◽  
Vol 235 ◽  
pp. 03049
Author(s):  
Tongyang Wei ◽  
Yong Yang

Facing the current information age, this study aims to probe into the application of internet products of mobile terminals in the new agricultural business entities, and to analyze the advantages and disadvantages of the application. Based on this, the research group conducted an in-depth research on the new agricultural business entities in eight provinces and cities nationwide to understand the application of information products in the new agricultural business entities, in order to provide important reference and innovative ideas for the agricultural management departments and decision-making departments to carry out the work of training, fostering, guiding and serving new business entities.


Author(s):  
Yushi Shen ◽  
Yale Li ◽  
Ling Wu ◽  
Shaofeng Liu ◽  
Qian Wen

This chapter is about guidance and implementation prepared by the Cloud Security Alliance (CSA) Security as a Service (SecaaS) workgroup, which is made up of users and practitioners in the field of information security. In preparing this implementation guide, input has been sought from experts throughout Europe, the Middle East, and the United States. A lot of professional judgment and experience are applied in the architecture, engineering, and implementation of a Security Information and Event Management (SIEM) guide to ensure that it logs the information necessary to successfully increase visibility and remove ambiguity, surrounding the security events and risks that an organization faces. By providing SIEM as a service under SecaaS, the provider has to be able to accept log and event information, customer information and event feeds, and conduct information security analysis, correlation, and support incident response. By providing flexible real-time access to SIEM information, it allows the party consuming the SIEM service to identify threats acting against their environment cloud. This identification then allows for the appropriate action and response to be taken to protect or mitigate the threat. The simple step of increasing visibility and removing ambiguity is a powerful tool to understanding the information security risks that an organization is facing.


Sign in / Sign up

Export Citation Format

Share Document