Please enter the keywords
Member Login
Immediately registered
Forgot Password
Please contact the administrator to help recover:
market@neoway.com
Login
Contact Us
Pre-sales Consulting
Ameria: intl@neoway.com
Europe: sales.europe@neoway.com
India: sales.india@neoway.com
Asia: sales.asia@neoway.com
Global: sales@neoway.com
Technical Support
support@neoway.com

EN
Wireless Module Networking Security Technology Issues in Detail
Time:2023-02-02

Security management should have been a part of network management. However, due to the various security vulnerabilities and threats in the public information networks that people use in their daily lives, security management remains one of the most difficult and weakest links in network management.


As the importance of networks continues to grow and users' demands for network security increase, the current situation has formed: the network management system mainly deals with fault management, performance management, and configuration management, while security management software is generally developed independently.


The wireless module also have security issues during networking. The starting point for security in sensor networks and general network security is the same, and the following issues need to be addressed:


Confidentiality issues in the networking of the wireless module


All sensitive data must ensure its confidentiality during storage and transmission, so that no one can directly obtain the message content when intercepting physical communication signals.


Message authentication between point-to-point networking of the wireless module


When a network node receives a message sent by another node, it can confirm that the data packet is indeed sent out from the node and not someone else.


Integrity authentication issues in the networking of the wireless module


When a network node receives a data packet, it can confirm that the data packet is exactly the same as when it was sent out, and has not been tampered with by intermediate nodes or communication errors during transmission.


Freshness issues in the networking of the wireless module


The data itself has a time limit. Network nodes can determine that the latest received data packet is the latest data packet generated by the sender. There are generally two reasons for freshness issues: one is caused by the non-deterministic delay of the network multipath, which causes the received data packet to be out of order; and the other is caused by the replay attack of malicious nodes.


Authentication group multicasting/broadcasting issues in the networking of the wireless module


Authenticate group multicasting/broadcasting solves the authentication security problem of a single node sending a unified notice to a group of nodes/all nodes. The sender of the authenticated broadcast is one, and the receiver is many, so the authentication method is completely different from the point-to-point communication authentication.


Security management issues in the networking of the wireless module


Security management includes two parts: security boot and security maintenance. Security boot refers to the process in which a network system gradually forms a unified and complete secure network with security channel protection from a set of dispersed, independent, and unsecured individuals according to predetermined protocol mechanisms.


The security boot process in the Internet includes identity authentication of communication parties, negotiation of secure communication encryption/decryption keys/authentication keys, etc. The security boot process is the most important, complex, and challenging content for sensor networks, because various methods for traditional security boot problems cannot be used in sensor networks due to their computational complexity.


Security maintenance mainly studies key updates in communication and security changes caused by network changes, and the method is often an extension of the security boot process.


The technology of wireless module is not only limited to management and design. These security issues should be fully considered at all levels of network protocols, but the focus of research is different.


The confidentiality of the physical layer mainly focuses on security coding; the confidentiality of the data frame and routing information is considered in the link layer and network layer; and the research on confidentiality in the application layer is on the management and exchange of keys, providing security support for encryption and decryption technologies in lower layers.

Data Fusion Characteristics of the Wireless M...
Detailed Analysis of Function Parameters of t...