Skip to main content

Protocol Design of Efficient Access for Laptop in Wi-Fi Networks with Guaranteed Security

  • Conference paper
  • First Online:
  • 1204 Accesses

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 515))

Abstract

Computer security is very important since three decades ago, which becomes quite challenging especially in the wireless access scenarios. In this paper, we summarize the technologies of the development over the computer security. Then, we propose a couple of iterative algorithms to carry out the laptop selection to wirelessly access the computer networks with the existence of the eavesdropper. The goal of designing the algorithms is, respectively, to maximize the secured throughput of the wireless access channel and maximize the energy efficiency for the target laptop with the existence of the eavesdropper. Simulations demonstrate the effectiveness of the proposed algorithms.

This paper is partially supported by the Scientific and Technological Support Project (Society) of Jiangsu Province under Grant BE2016776, the National Key Research and Development Program of China under Grant 2018YFB1003702.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Landwehr, C.E.: The best available technologies for computer security. Computer 16, 86–100 (1983)

    Google Scholar 

  2. Summers, R.C.: An overview of computer security. IBM Syst. J. 23, 309–325 (1984)

    Google Scholar 

  3. Abrams, M.D., Jeng, A.B.: Network security: protocol reference model and the trusted computer system evaluation criteria. IEEE Netw. 1, 24–33 (1987)

    Google Scholar 

  4. Andrews, M., Whittaker, J.A.: Computer security. IEEE Secur. Priv. 2, 68–71 (2004)

    Google Scholar 

  5. Obaidat, M.S., Macchairolo, D.T.: A multilayer neural network system for computer access security. IEEE Trans. Syst. Man Cybern. 24, 806–813 (1994)

    Google Scholar 

  6. Obaidat, M.S., Macchiarolo, D.T.: An online neural network system for computer access security. IEEE Trans. Ind. Electron. 40, 235–242 (1993)

    Google Scholar 

  7. Pierson, L.G., Witzke, E.L.: A security methodology for computer networks. AT&T Tech. J. 67(3), 28–36 (1988)

    Google Scholar 

  8. Branstad, D.: Security of computer communication. IEEE Commun. Soc. Mag. 16, 33–40 (1978)

    Google Scholar 

  9. Bleha, S., Slivinsky, C., Hussien, B.: Computer-access security systems using keystroke dynamics. IEEE Trans. Pattern Anal. Mach. Intell. 12, 1217–1222 (1990)

    Google Scholar 

  10. Mueck, M., Ivanov, V., Choi, S., Kim, J., Ahn, C., Yang, Y., Baldini, G., Piipponen, A.: Future of wireless communication: RadioApps and related security and radio computer framework. IEEE Wirel. Commun. 19, 9–16 (2012)

    Google Scholar 

  11. Gallego, A., Saxena, N., Voris, J.: Playful security: a computer game for secure wireless device pairing. In: 2011 16th International Conference on Computer Games (CGAMES), Louisville, KY, pp. 177–184 (2011)

    Google Scholar 

  12. Chang, Z., He, Q., Zhao, P.-Y., Liu, J.-S.: A wireless-LAN security model based on computer immunology. In: 2009 International Conference on Machine Learning and Cybernetics, Baoding, pp. 2054–2057 (2009)

    Google Scholar 

  13. Minin, I.V., Minin, O.V.: Information security services in the millimeter-wave computer network with wireless access. In: 2005 5th International Conference on Microwave Electronics: Measurement, Identification, Applications, pp. 154–157 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Juan Zhao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhao, J., Xu, X. (2019). Protocol Design of Efficient Access for Laptop in Wi-Fi Networks with Guaranteed Security. In: Liang, Q., Liu, X., Na, Z., Wang, W., Mu, J., Zhang, B. (eds) Communications, Signal Processing, and Systems. CSPS 2018. Lecture Notes in Electrical Engineering, vol 515. Springer, Singapore. https://doi.org/10.1007/978-981-13-6264-4_71

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-6264-4_71

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-6263-7

  • Online ISBN: 978-981-13-6264-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics