Select Country    |   Select Language    |   Search  In 
   Advanced Search
Motorola Home | About Motorola | Motorola Products & Services
wi4 Mesh
Login | Register | Why Register?
Mesh Networks Home > Technology MEA Security Overview
Technology
Technology History
Why Mesh?
MEA Technology Benefits
Mesh Networks & Industry Standards
MSR/ATP Overview
QDMA Overview
Position Location System
Multi-Radio Mobile Broadband
> MEA Security Overview
White Papers
Applications
Products
Newsroom
How to Buy
Contact Us
MEA/QDMA Network Layered Security Approach

Motorola has implemented numerous security management practices and capabilities in the operations and architecture of its network. Figure 1 shows an overview of the layered security approach typically deployed in Mobility Enabled Access (MEA) networks that utilize the Quadrature Division Multiple Access (QDMA™) Radio protocol.

Implemented Security Features

  • Quadrature Division Multiple Access (QDMA™) air interface based on state-of-the-art military technology.
  • All MEA transceivers are hardware authenticated and registered with the network to minimize insertion of unauthorized devices.
  • All 802.11 station card  transceivers are software authenticated by a AAA server to minimize use of cloned or stolen devices .
  • All MEA transceivers are software authenticated through the use of MEAP, a Motorola proprietary authentication  scheme.  
  • Motorola’ architecture minimizes the impact of RF jamming, denial-of-service, and physical attacks to the network.
  • End-to-end IP-based infrastructure supports VPN and other standards-based encryption schemes.
  • Ad hoc architecture keeps data secure when hopping through intermediate terminals.  
  • Group authentication and personal firewalls protect MEA subscriber devices from peer-to-peer attacks.

As a result of this layered approach to wireless security, MEA-based networks typically offer the following benefits:

  • Motorola solutions meet federal and local government standards for data privacy.
  • MEA based networks are resilient to interference, attacks, and failures.
  • Motorola’ s technology is flexible, and can incorporate new security approaches for the future.
Terms of Use | Privacy Practices | Contact Us
© Copyright 2004 Motorola, Inc. All Rights Reserved