Please login to be able to save your searches and receive alerts for new content matching your search criteria.
The study on human visual system points out that modification on wavelet high frequency subband coefficients is hard to be perceived by human eyes. Network security technology is benefit to information security transmission. The paper put forward a security transmission framework that utilize discrete wavelet transform to transmit secrete data (such as password, etc) carried by common picture in application layer and utilize VPN gateway based on the IPSec tunnel protocol to encapsulate IP packet in network layer. It provides a kind of new choice for end-to-end security transmission.
Wireless LANs have gained increasing market popularity in locations such as airports, cafés, universities, and businesses, but WLAN security remains an ongoing concern. The rapid deployment of WLANs has further emphasised the security vulnerabilities in the 802.11 standard which, in its initial deployment suffered from a number of security limitations. However mitigating these vulnerabilities implies an impact on network performance. In this paper, we investigate the network performance of WLANs when security technologies designed to improve the 802.11 standard are implemented. In particular we evaluated the performance of the 802. IX and VPN models including the various security configuration levels offered by each of these models. Experimental results indicated that the performance of various applications operating over the 802. IX security model performed better than over the VPN model. However each of these models offer a wide range of configuration options and operating conditions. These are analysed and the results discussed in this paper.
The Next Generation Internet is going to base on IPv6(Internet Protocol version 6) that has to support IPsec(Internet Protocol Security) that provided two kinds of security mechanisms: Encryption and Authentication. This paper is aimed to introduce AH(Authentication Header) and ESP(Encapsulating Security Payload), and a familiar key exchange algorithm, Diffie-Hellman, and analyzes some possible ways of optimization on it.