Font Size: a A A

Research And Design Of WLAN Security Architecture

Posted on:2006-02-25Degree:MasterType:Thesis
Country:ChinaCandidate:G B BaoFull Text:PDF
GTID:2168360152991807Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
WLAN is widely applied in different fields of economy, life and research for its convenience and efficiency. WLAN is changing our traditional ways of working and studying and make it available to achieve high quality services of voice, data and image in any time at any place. With the constant popularization of WLAN, the security of WLAN has been becoming a hot topic in the research of present computer networks. There are two ways to ensure the security of WLAN, one is to improve the technology of Authentication, and the other is to use the Encryption. The paper mainly discusses the techniques of WLAN security from the angle of enhancing the 1EEE802. 1x Authentication and bands the technology of RADIUS protocol and the Authentication of EAP-TLS together to improve the security in WLAN.The paper based on the wireless self-organized network technology analyzes the functions of the security control mechanism of wireless station' s access to WLAN. But it also demonstrates that the authentication and encryption mechanism specified by IEEE 802. 11 standard doesn' t provide enough security guarantees to WLAN, such as one-way authentication, WEP protocol and static key derivation which induce kinds of attacks to WLAN.The paper makes a further exploration on how to strengthen the security of WLAN by enhancing the security of IEEE802. 1x protocol and EAP-TLS protocol. It proposes the scheme of the user security management system, which is based on port access control standard IEEE 802. lx. In addition, it provides mutual authentication via EAP-TLS protocol based on being verified with digital credentials between wireless station and network. It also adopts dynamic key derivation to realize security authentication, key management and data protection, etc. Meanwhile, it offers solutions of major technical schemes to WLAN security. Finally, it designs and realizes the integrated security architecture on the basis of IEEE802. lx protocol, EAP-TLS protocol and RADIUS protocol. Furthermore, it builds up a testing platform according to RedHat Linux OS, FreeRadius Authentication Server and Xsupplicant Client, including the series of related tests to validate the architecture.
Keywords/Search Tags:IEEE802.11, WEP, IEEE802.1x, EAP-TLS, RADIUS, Security Authentication, key derivation, WLAN
PDF Full Text Request
Related items