Font Size: a A A

Study On Security Architecture And Key Technologies For Wireless Local Area Network

Posted on:2008-10-17Degree:DoctorType:Dissertation
Country:ChinaCandidate:Z Q WuFull Text:PDF
GTID:1118360242478296Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Nowadays, Wireless Local Area Networks (WLAN) have been primarily used in the college campuses, coffee shops, airports and other enterprises, because they can provide much higher transmission rate and better flexibility than current cellular systems. WLAN systems with the character of Ad hoc networks and Mesh networks will become more and more popular in certain application areas in the coming years. Next generation mobile Internet is expected to be based on Internet core networks and wireless access networks. They need for efficient merging of the wired and wireless infrastructure to support new network architectures, protocols and control mechanisms to provide new multimedia services and applications. However, security has already been a serious problem in this field due to the openness of wireless medium for public access within a certain range.In this thesis, we do broadly research on the method and technology of WLAN security architecture, including WLAN security architecture framework, secure accessing protocol, secure protocol in fast hand-off, Mesh secure protocol, WLAN anonymity protocol and measure model, adaptive secure policy, secure performance evaluation, and trusted WLAN architecture, etc.The objective of this thesis is to present an organism of security architecture for WLAN from the aspects of design, implementation and evaluation. The key contributions are as follows.1. Study on some key issues as "dots" for WLAN security architecture, including self-certified public-key authentication and key agreement protocol, fast hand-off security scheme based on location, ID based Mesh authentication protocol, WLAN dynamic Mix anonymity algorithm and anonymity protocol, joint-entropy based anonymity measurement model and so on. The prototype System of access authentication technology in Mesh networks is also implemented.2. Research on the design and implementation of WLAN security architecture as "lines" for two aspects. On one hand, we focused on WLAN networks security management, and put forward management based WLAN security architecture. On the other hand, we focused on mobile terminal, and put forward self-adaptive terminal integrate security authentication architecture scheme, with the principle and prototype implementation of the scheme. By the implementation of software system, we validated the feasibility of the integrate security authentication architecture scheme.3. Research on the technologies as "planes" for WLAN security architecture. We explored WLAN security architecture from self-adaptive security policy and the performance evaluation of security architecture, and putting forward policy based WLAN security management framework and entropy-weight coefficient based WLAN security risk quantitative scheme.4. Research on the trust architecture as a "space" from the development trend of WLAN security. Combining with the survivability of security architecture and the progress of TPM technology, we explored the trust service in WLAN architecture and put forward WLAN trust architecture framework based on TPM.
Keywords/Search Tags:Wireless Local Area Network, Security Architecture, Secure Access, Wireless Anonymity, Mesh Networks, Adaptive Security Policy, Security Performance Evaluation, Trust Architecture
PDF Full Text Request
Related items