Abstract
The rapid development of Internet and mobile communication technology has brought great changes to people’s daily production and life. At the same time, more and more users use wireless access to the Internet. In the process of wireless access, wireless router has become an essential and important equipment, and the network security of wireless router is the most important. In view of this, this paper designs a trusted network access verification system based on TCM module. Through experimental verification, it can be seen that the system designed in this paper can realize the trusted access of the router, thus greatly improving the security and credibility of the router.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hu, P., Wang, L.: Design of wireless local area network security program based on near field communication technology. In: Wong, W.E., Zhu, T. (eds.) Computer Engineering and Networking. Lecture Notes in Electrical Engineering, vol. 277, pp. 1109–1116 Springer, Cham (2014).
Li, W., Sun, F.: Analysis of wireless network security communication based on 4G communication technology. Electr. Power Inf. Commun. Technol. 12(1), 127–131 (2016)
Wang, F.H.: The application of wireless security communication in the industrial automation and control. Appl. Mech. Mater. 427–429, 492–496 (2013)
Yang, Y., Wang, J.-Z., Wu, B., et al.: A virtual scheme of router based on security isolation. In: Wireless Communication and Sensor Network: Proceedings of the International Conference on Wireless Communication and Sensor Network (WCSN 2015) (2015)
Qian, J., Yin, X.H.: The design of the intelligent robot wireless communication based on the network control system. Appl. Mech. Mater. 494–495, 1381–1384 (2014)
Mansour, C., Chasaki, D.: Adaptive security monitoring for next-generation routers. EURASIP J. Embed. Syst. 2019(1), 1–16 (2019)
Networks - Security and Communication Networks; Findings from S. Venkatraman and Co-Authors Reveals New Information on Security and Communication Networks (Use of Data Visualisation for Zero-Day Malware Detection). Computers, Networks & Communications (2019)
Li, F.: Analysis on computer communication network and the framework of the network security technologies. In: Proceedings of the 2017 4th International Conference on Machinery, Materials and Computer (MACMC 2017) (2018)
Qiang, H., Luo, F.: Review of secure communication approaches for in-vehicle network. Int. J. Automot. Technol. 19(5), 879–894 (2018)
Sharma, P.K., Ryu, J.H., Park, K.Y., Park, J.H., Park, J.H.: Li-Fi based on security cloud framework for future IT environment. Hum. Centric Comput. Inf. Sci. 8(1), 1–13 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Miao, W. (2020). Network Communication Security Program Design Based on Wireless Router. In: Xu, Z., Parizi, R., Hammoudeh, M., Loyola-González, O. (eds) Cyber Security Intelligence and Analytics. CSIA 2020. Advances in Intelligent Systems and Computing, vol 1146. Springer, Cham. https://doi.org/10.1007/978-3-030-43306-2_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-43306-2_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-43305-5
Online ISBN: 978-3-030-43306-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)