Skip to main content

Network Communication Security Program Design Based on Wireless Router

  • Conference paper
  • First Online:
Book cover Cyber Security Intelligence and Analytics (CSIA 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1146))

  • 1001 Accesses

Abstract

The rapid development of Internet and mobile communication technology has brought great changes to people’s daily production and life. At the same time, more and more users use wireless access to the Internet. In the process of wireless access, wireless router has become an essential and important equipment, and the network security of wireless router is the most important. In view of this, this paper designs a trusted network access verification system based on TCM module. Through experimental verification, it can be seen that the system designed in this paper can realize the trusted access of the router, thus greatly improving the security and credibility of the router.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hu, P., Wang, L.: Design of wireless local area network security program based on near field communication technology. In: Wong, W.E., Zhu, T. (eds.) Computer Engineering and Networking. Lecture Notes in Electrical Engineering, vol. 277, pp. 1109–1116 Springer, Cham (2014).

    Chapter  Google Scholar 

  2. Li, W., Sun, F.: Analysis of wireless network security communication based on 4G communication technology. Electr. Power Inf. Commun. Technol. 12(1), 127–131 (2016)

    Google Scholar 

  3. Wang, F.H.: The application of wireless security communication in the industrial automation and control. Appl. Mech. Mater. 427–429, 492–496 (2013)

    Article  Google Scholar 

  4. Yang, Y., Wang, J.-Z., Wu, B., et al.: A virtual scheme of router based on security isolation. In: Wireless Communication and Sensor Network: Proceedings of the International Conference on Wireless Communication and Sensor Network (WCSN 2015) (2015)

    Google Scholar 

  5. Qian, J., Yin, X.H.: The design of the intelligent robot wireless communication based on the network control system. Appl. Mech. Mater. 494–495, 1381–1384 (2014)

    Article  Google Scholar 

  6. Mansour, C., Chasaki, D.: Adaptive security monitoring for next-generation routers. EURASIP J. Embed. Syst. 2019(1), 1–16 (2019)

    Google Scholar 

  7. Networks - Security and Communication Networks; Findings from S. Venkatraman and Co-Authors Reveals New Information on Security and Communication Networks (Use of Data Visualisation for Zero-Day Malware Detection). Computers, Networks & Communications (2019)

    Google Scholar 

  8. Li, F.: Analysis on computer communication network and the framework of the network security technologies. In: Proceedings of the 2017 4th International Conference on Machinery, Materials and Computer (MACMC 2017) (2018)

    Google Scholar 

  9. Qiang, H., Luo, F.: Review of secure communication approaches for in-vehicle network. Int. J. Automot. Technol. 19(5), 879–894 (2018)

    Article  MathSciNet  Google Scholar 

  10. Sharma, P.K., Ryu, J.H., Park, K.Y., Park, J.H., Park, J.H.: Li-Fi based on security cloud framework for future IT environment. Hum. Centric Comput. Inf. Sci. 8(1), 1–13 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Miao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Miao, W. (2020). Network Communication Security Program Design Based on Wireless Router. In: Xu, Z., Parizi, R., Hammoudeh, M., Loyola-González, O. (eds) Cyber Security Intelligence and Analytics. CSIA 2020. Advances in Intelligent Systems and Computing, vol 1146. Springer, Cham. https://doi.org/10.1007/978-3-030-43306-2_2

Download citation

Publish with us

Policies and ethics