[1]吴明礼,陈斌. 移动互联环境下数据通信安全技术的应用研究[J].计算机技术与发展,2016,26(11):106-110.
 WU Ming-li,CHEN Bin. Research on Application of Data Communication Security Technology in Mobile Internet Environment[J].,2016,26(11):106-110.
点击复制

 移动互联环境下数据通信安全技术的应用研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
26
期数:
2016年11期
页码:
106-110
栏目:
安全与防范
出版日期:
2016-11-10

文章信息/Info

Title:
 Research on Application of Data Communication Security Technology in Mobile Internet Environment
文章编号:
1673-629X(2016)11-0106-05
作者:
 吴明礼陈斌
 北方工业大学 计算机学院
Author(s):
 WU Ming-liCHEN Bin
关键词:
 移动互联网通信安全完整性数字签名加密
Keywords:
 mobile Internetcommunication securityintegritydigital signatureencryption
分类号:
TP39
文献标志码:
A
摘要:
 随着信息技术的迅速发展,移动智能终端已经越来越普及,各种各样的手机应用程序给人们的日常生活和工作带来了便利。然而,移动互联网环境下数据通信安全面临着非法篡改、信息窃取、数据丢失等各种威胁。对移动互联环境下智能终端与服务器之间的网络通信安全策略进行了研究,借鉴互联网环境下的相关技术,充分考虑移动互联网的特点,提出了一种综合使用SHA、数字签名、椭圆曲线算法等技术的安全策略,保证智能终端和服务器在移动互联网环境下数据交互的安全性、完整性、一致性、不可抵赖性。该安全策略经过分析、编码实现与测试,具有较好的效果,在移动互联网项目中具有一定的实用和推广价值。
Abstract:
 With the rapid development of information technology,mobile intelligent terminal has become more and more popular,and a variety of mobile phone applications make people’ s daily life and work more convenient. However,in the mobile Internet environment, data communication security is facing various threats such as illegal tampering,information theft,data loss and so on. The research on se-curity policy of the network communication is carried out between the intelligent terminal and the server under the mobile Internet envi-ronment,and a comprehensive security strategy for the use of SHA,digital signature,elliptic curve algorithm and so on is proposed by ref-erence of the related techniques and considering the characteristics of mobile Internet,ensuring the security,integrity,consistency and non repudiation of the data interaction between the mobile terminal and the server in the mobile Internet environment. This security strategy has good effect through analysis and encoding implementation and testing,and has a certain practical and promotional value in the mobile Internet project.

相似文献/References:

[1]程桂花 王杨 赵传信 邓琨.应用模逆运算的移动互联网可信终端设计方法[J].计算机技术与发展,2012,(11):243.
 CHENG Gui-hua,WANG Yang,ZHAO Chuan-xin,et al.Design Method on Trusted Terminal Access Device by Modular Inversion in Mobile Internet[J].,2012,(11):243.
[2]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(11):1.
[3]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(11):5.
[4]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(11):13.
[5]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(11):21.
[6]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(11):25.
[7]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(11):29.
[8]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(11):34.
[9]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(11):38.
[10]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(11):43.
[11]于海平[],林晓丽[],刘会超[]. 基于数据挖掘的移动广告个性化推荐研究[J].计算机技术与发展,2014,24(08):234.
 YU Hai-ping[],LIN Xiao-li[],LIU Hui-chao[]. Research of Mobile Internet Advertising Personalized Recommendation Based on Data Mining[J].,2014,24(11):234.
[12]王立俊[],杨磊[],杨颖[]. 粮食保障决策指挥系统的设计与实现[J].计算机技术与发展,2015,25(07):158.
 WANG Li-jun[],YANG Lei[],YANG Ying[]. Design and Implementation of Decision and Command System for Food Guarantee[J].,2015,25(11):158.
[13]王杉,孙滔. 移动互联网下科技查新服务平台的研究与设计[J].计算机技术与发展,2015,25(12):182.
 WANG Shan,SUN Tao. Research and Design of Sci-tech Novelty Search Service Platform Based on Mobile Internet[J].,2015,25(11):182.
[14]赵雷[],程瑶[]. 智能终端中正确高效地使用Flash的研究[J].计算机技术与发展,2016,26(05):128.
 ZHAO Lei[],CHENG Yao[]. Research on Correct and Efficient Application of Flash in Intelligent Terminal[J].,2016,26(11):128.

更新日期/Last Update: 2016-12-13