[图书][B] Security and Privacy for Next-Generation Wireless Networks

S Zhong, H Zhong, X Huang, P Yang, J Shi, L Xie… - 2019 - Springer
… One solution is to add intrusion detection systems to the … The eNodeB is a mobile network
access device of LTE. … have multiple ways to access network, but it is difficult to adopt existing …

Classification of existing virtualization methods used in telecommunication networks

D Ageyev, O Bondarenko, T Radivilova… - 2018 IEEE 9th …, 2018 - ieeexplore.ieee.org
… Investigating the statistics of mobile operators, it can be noted … Increase in the percentage
of equipment utilization - this results in … network resources allows you to create virtual private

[HTML][HTML] A survey of virtual private LAN services (VPLS): Past, present and future

K Gaur, A Kalla, J Grover, M Borhani, A Gurtov… - Computer Networks, 2021 - Elsevier
… service provider by deploying CE devices configured with VPN software. CE devices are …
It provides secure methods for IP multi-homing and mobile computing. There are certain …

Survey on wireless network security

R Nazir, AA Laghari, K Kumar, S David… - … of Computational Methods …, 2021 - Springer
… area networks (WLAN), cell phone networks, wireless sensor … part of wireless networks is
the router device, which provides … For setting up on Ad-hoc mode, manual configuration is …

Towards a secure and scalable iot infrastructure: A pilot deployment for a smart water monitoring system

A Overmars, S Venkatraman - Technologies, 2020 - mdpi.com
… to the security burden of a Virtual Private Network (VPN) based deployment, 50 billion devices
cannot be … and encryption of existing cellular infrastructures by mobile operators and have …

Secure access service edge: A multivocal literature review

MN Islam, R Colomo-Palacios… - 2021 21st International …, 2021 - ieeexplore.ieee.org
… remote access by a Virtual Private Network (VPN) and SD-… architectures with each product,
configuring a series of rules, … and networking edge devices with strict connection methods […

User Profiling with Virtual Pet for Mobile Device Authentication

S Yun Lim, JNM Kho - … Conference, ICIEIS 2011, Kuala Lumpur, Malaysia …, 2011 - Springer
… Such methods can prevent devices from being used by … Based on the owner’s reply, it will
add the device names and … The reality is that the evolution of mobile networking has increased …

Dynamic setup of IPsec VPNs in service function chaining

H Gunleifsen, T Kemmerich, V Gkioulos - Computer Networks, 2019 - Elsevier
… of dynamic Virtual Private Networks (VPN) in the application domain of Network Function …
We introduce a method for mutual and secure authentication of encryption functions in an …

[PDF][PDF] Design of computer networking courses with major in cyber security

S Bevinakoppa, A Alazab, T Jan - International Journal of Education …, 2018 - academia.edu
devices across complex workgroup networks. Networking courses will cover operation,
configuration … range of techniques, tools and policies to secure wireless networks and wireless …

Wpa2 based wireless enterprise configuration

SB Hegde, A Ranjan, A Raj, K Paul… - … on Mobile Networks …, 2021 - ieeexplore.ieee.org
devices or supplicants should be correctly configured before … the EAP methods in general
and the EAP-PEAP method that … provide guests with access, virtual private networks (VPN) and …