Font Size: a A A

Research Of Wireless Lan's Security And Authentication

Posted on:2005-10-23Degree:MasterType:Thesis
Country:ChinaCandidate:Q ZhouFull Text:PDF
GTID:2168360152469147Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Wireless LAN is widely used and be known by its convenience and agility. Wireless LAN have the character of open channel, so the security of WLAN requires higher than wired LAN's. The spread of WLAN will be confined if we can't solve the potential security problem. On the basis of summarizing the security of protocol on internal and external's WLAN, for example IEEE 802.11, we bring up the improved scheme about the security on typical WLAN. The scheme improved, which can fully use the facilities we have installed, adopt IPSec VPN on IP layer protocol and Synchronized Pseudo Random Number Generation on MAC layer. The new scheme applies the method of IPSec VPN to the wireless LAN environment which has security shortcoming and encapsulates the information in IP layer, so it can ensure the confidentiality, integrity and access control capability of traffic transmission over wireless medium , at the same time it improves the compatibility to the latter products. We study the implementation model of IPSec VPN for both of Ad-hoc and Infrastructure mode. IPSec VPN scheme can't completely resolve the security problem of MAC layer and it requires more on its facilities. So we adopt SPRiNG to realize the security authentication and confidentiality. The SPRiNG is a security protocol on authentication which adopt the way of mutual-authentication and dynamic key to ensure the security of MAC layer on its transfer process. Using the supplemental BAN logic, a process of formal analyse of this scheme protocol. By the wireless Lan's facilities we have now , IPSec VPN and SPRiNG can solve the main security problem which the wireless lan confront.
Keywords/Search Tags:Wireless Local Area Network security, Virtual Private Network, Synchronized Pseudo Random Number Generation
PDF Full Text Request
Related items