正在加载图片...
/ireless in the enterprise 363 3.2 Achieving security by enhancing dependability of wireless infrastructure Before deploying wireless in the enterprise environment on a large scale, one important ssue is the (lack of) dependability of wireless infrastructure. We believe that secure and dependable wireless solutions must be designed and implemented before mission-critical data can be put on wireless infrastructure. The dependability problems arise due to component failures or is caused by attacks. Both these require very careful attention as far as the enterprise environment is concerned. We also believe that techniques used for wireless dependability could also lead to increased security. As shown in Figure 6, increased dependability is achieved by fault-tolerance or added redundancy in the wireless infrastructure. This fault-tolerance allows business transactions to be executed even when there are one or more failures in the infrastructure. This redundancy would also allow overcoming or at least alleviating dos attacks If an attack occurs at device, access, network or server levels, the redundancy would allow switching to another network, server or device interface as shown in Figure 6. The proposed solution is also scalable in terms of number of users and transactions and the network size Figure 6 A dependable, secure and scalable solution for wireless enterprise DoS attacks or security Network provider 1 Device-level redundancy ider 2 WLAN: Wireless Local Area Networks PAN: Personal Area Networks 4 Possible approaches for research in wireless enterprise Traditional wireless research has been conducted by building simulation and analytical models, designing and implementing limited-coverage wireless networks and by accessing and analysing large public and private wireless networks. Many of theseWireless in the enterprise 363 3.2 Achieving security by enhancing dependability of wireless infrastructure Before deploying wireless in the enterprise environment on a large scale, one important issue is the (lack of) dependability of wireless infrastructure. We believe that secure and dependable wireless solutions must be designed and implemented before mission-critical data can be put on wireless infrastructure. The dependability problems arise due to component failures or is caused by attacks. Both these require very careful attention as far as the enterprise environment is concerned. We also believe that techniques used for wireless dependability could also lead to increased security. As shown in Figure 6, increased dependability is achieved by fault-tolerance or ‘added’ redundancy in the wireless infrastructure. This fault-tolerance allows business transactions to be executed even when there are one or more failures in the infrastructure. This redundancy would also allow overcoming or at least alleviating DoS attacks. If an attack occurs at device, access, network or server levels, the redundancy would allow switching to another network, server or device interface as shown in Figure 6. The proposed solution is also scalable in terms of number of users and transactions and the network size. Figure 6 A dependable, secure and scalable solution for wireless enterprise 4 Possible approaches for research in wireless enterprise Traditional wireless research has been conducted by building simulation and analytical models, designing and implementing limited-coverage wireless networks and by accessing and analysing large public and private wireless networks. Many of these
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有