MEA/QDMA Network Layered Security Approach
Motorola has implemented numerous security management practices and capabilities in the operations and architecture of its network. Figure 1 shows an overview of the layered security approach typically deployed in Mobility Enabled Access (MEA) networks that utilize the Quadrature Division Multiple Access (QDMA) Radio protocol.
Implemented Security Features
- Quadrature Division Multiple Access (QDMA) air interface based on state-of-the-art military technology.
- All MEA transceivers are hardware authenticated and registered with the network to minimize insertion of unauthorized devices.
- All 802.11 station card transceivers are software authenticated by a AAA server to minimize use of cloned or stolen devices .
- All MEA transceivers are software authenticated through the use of MEAP, a Motorola proprietary authentication scheme.
- Motorola’ architecture minimizes the impact of RF jamming, denial-of-service, and physical attacks to the network.
- End-to-end IP-based infrastructure supports VPN and other standards-based encryption schemes.
- Ad hoc architecture keeps data secure when hopping through intermediate terminals.
- Group authentication and personal firewalls protect MEA subscriber devices from peer-to-peer attacks.
As a result of this layered approach to wireless security, MEA-based networks typically offer the following benefits:
- Motorola solutions meet federal and local government standards for data privacy.
- MEA based networks are resilient to interference, attacks, and failures.
- Motorola’ s technology is flexible, and can incorporate new security approaches for the future.
|