Font Size: a A A

Research And Application Of The Security Of Wireless LAN System

Posted on:2005-08-08Degree:MasterType:Thesis
Country:ChinaCandidate:Y NiFull Text:PDF
GTID:2168360122980279Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
As we all know that WEP encryption mechanism can not provide sufficient security protection for wireless subscribers. So the security problem became the restriction for WLAN to go further just at the beginning of its application in commerce. Many potential users are interested in the agility of the WLAN technology, but they are hesitant to use it for the reason of insecurity.Since the poor situation of the security of WLAN system, after having analyzed many security mechanisms, we decide to implement EAP-TLS to improve the security level for its two-way authentication and dynamic key mechanisms. In end of the paper, we also give some analyses on WAPI (WLAN Authentication and Privacy Infrastructure) which is a national standard for WLAN security. Some suggestions and improvements will be given.In this paper, we will mainly discuss the key security technologies of WLAN system. And also some analysis and comparison of the technologies will be provided. The mainly research results are list as follows.1) Some protocols have been analyzed deeply, including IEEE802.1H draft and some other protocols related to authentication and key management.2) In the paper some security solutions of WLAN system have been provided. They are suitable for different situation.3) Because of the good performance on secure authentication, the EAP-TLS protocol is chosen to be implemented.4) We also give some analyses on WAPI (Wired Authentication and Privacy Infrastructure) which is a national standard for WLAN security. Some suggestions and improvements will be given.5) Some security problems about roaming between WLAN and 3G are also discussed. We have analyzed the implementation mechanism, and give some glimpse on the evolution of the WLAN system.
Keywords/Search Tags:WLAN, Security, Authentication, Data encryption
PDF Full Text Request
Related items