Font Size: a A A

Design And Realization Of Identity Authentication Of WLAN

Posted on:2006-04-25Degree:MasterType:Thesis
Country:ChinaCandidate:B LiuFull Text:PDF
GTID:2178360212959234Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Improving the office automation(OA),networking,electrization of government,general sharing information has been the main trend nowadays. With notebook PC and PDA widely used, WLAN has been the important part of the network of E-government affair. But, because of wireless dada transmission, WLAN has been threatened by some attacks such as wiretapping,counterfeiting identity,sophisticating information and so on. The advantage of wireless work has brought a lot of hidden troubles simultaneously. Therefore, how to guarantee the security of WLAN has been the great problem of going deep into developing the project of the network of E-government affair.The article mainly studied the design and realization of identity authentication in WLAN, considering the material application in E-government. Firstly by introducing the development instance and the essential realization technology, then analyzing the existent menace of security, and pinning our hope on the function of authentication of high-layer protocol by considering the efficiency problem of wireless channel, the model of layered authentication protocol has been designed based on the existing essential authentication in WLAN. It included contents of three aspects: the forming of the chain of public key certificate, authentication in domain, authentication between domains. After that, an authentication gateway based on PKI has been designed in material application in electronic government affair. After affirming the authentic identity of the user, authentication gateway awards the digital certificate including the user's public key, and authenticates the period of validity and the effect area of this user. Other user's public key can be affirmed only when they can validate the authenticity of the certificate and trust the CA of awarding the certificate. AT last, through using the OPNET, we realized the Simulation of WLAN and ordinarily analyzed the performance of system. In the material Simulation, we took the Simulation of WLAN into three parts: the model of network,the model of node,the model of process. And we analyzed the essential parameters such as the parameters of the input interface and the parameters of the output interface and so on.
Keywords/Search Tags:WLAN, E-government, Layered Authentication, PKI, WLAN Simulation
PDF Full Text Request
Related items