Font Size: a A A

Study The Security Of Military Network Based On Wireless LAN

Posted on:2008-01-13Degree:MasterType:Thesis
Country:ChinaCandidate:B ZhangFull Text:PDF
GTID:2132360242473666Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
WLAN is widely applied in different fields of economy, life and research for its convenience and efficiency.WLAN is changing our traditional ways of working and studying and make it available to achieve high quality services of voice, data and image in any time at any place.Also for WLAN's characteristics that there are great space for it would be apply in military communications. With the constant popularization of WLAN, the security of WLAN has been becoming a hot topic in the research of present computer networks. The paper based on the wireless self-organized network technology analyzes the functions of the security control mechanism of wireless station's access to WLAN. But it also demonstrates that the authentication and encryption mechanism specified by IEEE 802. 11 standard doesn't provide enough security guarantees to WLAN, such as one-way authentication, WEP protocol and static key derivation which induce kinds of attacks to WLAN.There are two ways to ensure the security of WLAN, one is to improve the technology of Authentication, and the other is to use the Encryption. The paper mainly discusses the techniques of WLAN security from the angle of enhancing the IEEE802.1x Authentication and bands the technology of Radius protocol and the Authentication of EAP-TLS together to improve the security in WLAN.The paper proposes the scheme of the user security management system, which is based on port access control standard IEEE 802.1x. In addition,it provides mutual authentication via EAP-TLS protocol based on being verified with digital credentials between wireless station and network.It also adopts dynamic key derivation to realize security authentication,key management and data protection, etc. Meanwhile, it offers solutions of major technical schemes to WLAN security. Finally, it designs andrealizes the integrated security architecture on the basis of IEEE802.1x protocol, EAP-TLS protocol and RADIUS protocol.
Keywords/Search Tags:WLAN, IEEE802.11, WEP, IEEE802.1x, EAP-TLS, RADIUS, Security Authentication, key derivation
PDF Full Text Request
Related items