Font Size: a A A

The Analysis And Study Of Wireless LAN Security

Posted on:2007-03-06Degree:MasterType:Thesis
Country:ChinaCandidate:L G PanFull Text:PDF
GTID:2178360182986578Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
With the rapid growth of WLAN, the WLAN has got widely deployed in many fields, even in military. At the same time, the quick development of WLAN has brought about more security requirements in WLAN. Most WLAN based on 802.11 standards adopt WEP as security mechanism to provide data security in WLAN. For lack of taking the security problems into consideration at the time when WEP was designed, some security flaws are left behind in WEP. The development of WLAN urges the exposure of the security flaws, resulting in WEP cannot meet the requirement. Base on the analysis of main security problems of WEP, this paper presents a solution to security problems in WLAN.In this thesis, we analyze the mechanism of the security protocols mentioned above. We point out their merits and flaws, and present some attacking ways by means of the design flaws in the protocols. We forecast the development trend of WLAN security technologies. At present researchers are studying how to choose the optimal encryption algorithm, data hash algorithm in WLAN. They are also trying to find the best authentication scheme and key management scheme. They make an effort to design the security protocol of higher efficiency and easier realization. In this paper a remote password authentication scheme based on one-way hash function was proposed. In this scheme, any user can freely choose his password in the card initialization phase. There is no limitation of the number of the users, and there is no need for the system to keep the passwords of the users. Using his password and smart card, any legal user can log into the remote system successfully. According to the analysis, intruders cannot obtain any secret information from the public information or transmitted messages and impersonate another legal user.In the end, we put forward our further research aims on the security and administer policy of WLAN.
Keywords/Search Tags:Wireless LAN, WEP protocol, TKIP protocol, 802.1X protocol, Smart card
PDF Full Text Request
Related items