Font Size: a A A

Analysis And Application Of WLAN Authentication Protocol

Posted on:2006-05-13Degree:MasterType:Thesis
Country:ChinaCandidate:W H HeFull Text:PDF
GTID:2168360155465453Subject:Power system and its automation
Abstract/Summary:PDF Full Text Request
Since the electromagnetic wave has been invited, the development of the wireless communication becomes faster and faster. In some meaning, we cannot live without wireless communication.But the wireless network science also develops faster than before. Today many kinds of technology come out and problems of network security appear.WLAN is chosen to my research object because it is the newest science and technology and companies and families use it all over the world. While we enjoy the advantage which WLAN brings to us, we shall not neglect the problem of security. Electromagnetic wave is the carrier of the WLAN and it can travel through ceilings, glass, bricks and wall. So every of the wireless clients can receive the electromagnetic wave signal while it is in the service area. Also the client can receive the data or the signal which the administrator doesn't want it to do. We originally want people not to use WLAN only because of the security problem. We hope that people realize what the wireless network security problem is and know the solution to reduce the risk of the WLAN users after they have read this paper.Based on the analysis and summarizing of some of the WLAN protocols, this paper makes a theoretical analysis on Wired Equivalency Privacy and the authentication technology of 802.1x, studies there security factor and putsforward some advices to improve WEP and 802.lx. At last I present an authentication scheme of a project of a RS232 radios network.Actuality, foreground and the application field of the wireless network is introduced simply in Chapter 1.In Chapter 2 the wireless network is analyzed on the sides such as conception, specialty and the technical demand.First the structure of 802.11 is presented in Chapter 3. Then physics layer and MAC layer is illuminated.Chapter 4 particularly discussed the authentication of 802.11b and 802.lx. Section 4.1 points out their working principle and the weakness. At the same time it presents some advices to improve them.A reference authentication scheme using in a project of an RS232 radios network is recommended in Chapter 5.
Keywords/Search Tags:802.11, WEP, WLAN, RC4, authentication
PDF Full Text Request
Related items