Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Пособие ФИБ 2010 3 курс.doc
Скачиваний:
5
Добавлен:
03.11.2018
Размер:
1.19 Mб
Скачать

6. Answer the questions

What are the peculiarities of wireless communication?

What are the forms of wireless communication?

How can the security of wireless systems be classified?

What is the forecast of wireless systems protection?

7. Mark the following statements true or false. Correct the false statements.

1. An access to corporate and private data is often gained via wireless devices now.

2. Security breeches in wireless devices don’t have as disastrous outcomes as in corporate networks.

3. Modern information protection systems aren’t efficient in counteracting the attacks against wireless devices.

4. Nomadic access implies permanent access.

5. Security of the application protects using e-mail.

6. Security of the wireless communication helps to protect the process of sending and receiving messages.

7. The vulnerability of wireless systems is still underestimated.

8. Bluetooth is considered to be the most secure.

9. Further development of third generation systems will lead to new information protection problems.

Vocabulary tasks

8. Give as many word combinations as possible and translate them.

Application

9. What do the following abbreviations from Text 1 mean?

PDA, WLAN, IP, MANET

10. Give your definitions of the following terms.

wireless environment

vulnerability

smart device

11. Make the word combinations.

1. data

a) network

2. nomadic

b) compromise

3. inbound

c) rate

4. two-way

d) interconnect

5. cordless

e) of an enterprise

6. power

f) traffic

7. ad hoc

g) access

8. cross-building

h) radio

9. security

i) system

10. assets

j) consumption

12. Translate into Russian the following passage.

In recent years, many authentication protocols for the wireless network have been proposed. When a mobile user is roaming in wireless environment, it is desirable to protect the relevant information about him. Assuring the anonymity of a mobile user prevents unintended parties from associating him with the messages to/from him or with the sessions in which he participates. The disclosure of a mobile user’s identity allows unauthorized entities to track his moving history and current location. The illegal access to any information related to users location without his notice can be a serious violation of his privacy. So, anonymity is one of importance property of these protocols.

A basic solution for the provision of user anonymity is to use the temporary identity (TID) of a mobile user instead of his real one. Several security-related protocols with anonymity for wireless mobile communication systems have been proposed based on the symmetric key cryptography or the public key cryptography. However, in a mobile communication system, there are a few things to consider when security protocols are being designed. First, the low computational power of mobile devices should be considered, which means a security protocol requiring heavy computation on the mobile nodes is not adequate. Secondly, wireless mobile communication networks have a lower bandwidth and a higher channel error rate than wired networks. So, the security protocols should be designed to minimize the message sizes and the number of messages exchanged. Our proposed authentication scheme is based on the public key cryptosystems, but mobile users only do symmetric encryption and decryption.