Font Size: a A A

Research On Large-scale Centralized Wireless LAN Security

Posted on:2013-01-28Degree:MasterType:Thesis
Country:ChinaCandidate:W DaiFull Text:PDF
GTID:2248330395980692Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of wireless communication technology and the wide application ofthe wireless network, large-scale centralized wireless LAN (LSCWLAN: Large-ScaleCentralized Wireless LAN) has been more people of all ages, it is for people to provide a flexible,high-speed, easylow-cost wireless Internet access services have been widely used in largecorporate, residential, and institutions, airports, and even part of the city.Wireless network security and protection system has yet to be step increase, First, theexisting wireless network security technology is limited to the authentication and encryption,security measures too little; Second, the existing security system is basically static, difficult toadapt to changing network environment of the WLAN equipment performance, user roaming,mobile attack; Third, wired network security technology is quite mature, but the radio channelcharacteristics so that it faces new threats, such as pseudo-AP attack the underlying DOS attack,need to develop new protective technologies to deal with. In this paper, on the basis of study ofWLAN knowledge and security technology, proposed three new content:Adaptive security model: depending on the network topology, the protection needs and thedynamic changes of the security threats flexibility to adjust the security structure, functiondeployment, protection level, both so that limited resources can be fully utilized in the WLAN,can adapt to environmental variability.Pseudo-AP detection: for the deficiencies of the existing methods, on the basis of in-depthunderstanding of the WLAN implementation process, proposed a more efficient pseudo APdetection technology, and design a response, related to the channel switching and terminaltransfer.Underlying DOS protection: By analyzing the characteristics of the underlying DOS attacksWLAN propose a method for detecting DOS attacks, be able to to recognize greed user andinterference attacks, and propose a method to deal.
Keywords/Search Tags:WLAN(Wireless Local Area Network), IEEE802.11, Centralized WLAN, AP(Access Point), AC(Access Controller), Fit AP, Adaptive Security, Pseudo-AP, DOS
PDF Full Text Request
Related items