This paper focuses on the formal verification of MANET non-secure and secure routing protocols.
在安全问题中,路由协议的正确性尤为重要。
With the widely use of wireless network, it is an important research field how to design a secure routing protocol which is effective for Ad hoc network.
随着无线网络的广泛应用,设计一种有效安全的路由协议是目前亟待研究的重要课题。
This paper presents an attack detection policy based on data link monitoring with support of secure routing protocol, which aims at traffic pattern distortion attacking.
该文在安全路由协议的基础上,针对流量模式类攻击,提出一种基于数据链路监视的攻击检测机制。
Currently, the major sub-areas of security research include secure routing; secure group communications; intrusion detection, authentication and group key management etc.
目前,移动自组网络安全技术较为集中的研究领域包括安全路由技术、安全组通信技术、认证技术、入侵检测以及密钥管理技术等。
CGBS is required if you run the secure proxy server in medium security mode in order to dynamically obtain routing information.
如果为了动态获得路由信息而在中级安全模式下运行安全代理服务器,那么需要使用CGBS。
The secure proxy server will then use this static routing information to target application requests.
安全代理服务器将使用这个静态路由信息来确定应用程序请求。
When an application request is received, the secure proxy will use this in-memory routing information to target the request.
当收到一个应用程序请求后,安全代理将使用这个内存路由信息来定位请求。
With a DMZ secure proxy server in high security mode (the default), you are required to supply a file that contains static routing information to the secure proxy server.
对 DMZ安全代理服务器使用高级安全模式(默认设置),您需要为安全代理服务器提供一个包含静态路由信息的文件。
When configured in medium security mode, the dynamic routing information is obtained and used by the secure proxy server.
当配置为中级安全模式,安全代理服务器将获得并使用动态路由信息。
At startup, the on demand configuration code inside the secure proxy reads the static route file and builds the in-memory routing data.
在启动后,安全代理内部的随需应变配置代码将读取静态路由文件并构建内存路由数据。
The secure proxy can only support routing HTTP protocol for a super cluster.
安全代理只能够支持超级集群的路由HTTP协议。
In all these scenarios, you can use the higher-level Web service protocols such as WS-Addressing and WS-Security, which give you flexible routing schemes and secure interactions, respectively.
在所有这些场景中,您可以使用诸如ws - Addressing和WS - Security等高级Web服务协议,这些协议分别为您提供灵活的路由方案和安全的交互。
Thus, routing information (along with application traffic) is exchanged between the back-end application server cell and the secure proxy server cell.
因此,路由信息(以及应用程序通信量)在后端应用服务器cell和安全代理服务器cell之间交换。
If the Web server was used as a security measure in the DMZ, then the proxy cannot replace it — but it can sit in the secure zone to help with the routing and load balancing.
如果将Web服务器作为DMZ中的安全措施,则代理无法替代它——但可以在安全区内帮助进行路由和负载平衡。
As a key element in secure wireless sensor networks, routing protocol security constitutes a potential block to impending wide deployment of wireless sensor networks.
路由协议安全作为传感器网络系统安全中尤为重要的环节,是制约无线传感器网络应用的关键。
The existing multicast routing is difficult to guarantee this, so it is still a hot spot for Secure multicast.
现有的组播路由技术很难保证这一点,所以安全组播仍然是一个热点。
MCPK-based security with routing protocols, OLSR neighbor detection stage by the introduction of secure authentication mechanisms to prevent wormhole attacks.
采用基于MCPK的安全路由协议,通过在OLSR邻居探测阶段引入安全验证机制来预防虫洞攻击。
At last, Shared key is adopted to maintain the security of message transmitting. Finally, performance evaluation of routing algorithm and secure mechanism is showed in NS2 under different topologies.
最后,使用网络仿真工具ns2在多种网络场景下分别对提出的路由算法和安全机制进行了性能评估。
Then a secure architecture was given, which includes secure wireless ad hoc routing, secure packet for-warding and secure data link layer.
在总结现有安全机制的基础上,提出了一种具有攻击防御、攻击探测和攻击反应能力的移动自组网络安全架构。
Then a secure architecture was given, which includes secure wireless ad hoc routing, secure packet for-warding and secure data link layer.
在总结现有安全机制的基础上,提出了一种具有攻击防御、攻击探测和攻击反应能力的移动自组网络安全架构。
应用推荐