Font Size: a A A

Research And Implementation Of Dynamic Security Model In Wireless Network

Posted on:2007-07-08Degree:MasterType:Thesis
Country:ChinaCandidate:L P RanFull Text:PDF
GTID:2178360212968536Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The development of The Wireless Network brings a lot of convenience for the organizations and the individuals ,It has the transportability, conveniently, flexibility and so on the merit. However, The Wireless Networks exposes to many hidden dangers and suffers from the attacks by hackers. The security problem is the key of wireless network developing. Though the early measures as SSID, ACL and WEP have guaranteed the wireless network security in the certain degree. However, these measures are still many leaks. With the further development and application of the wireless networks, the early security measures can not guarantee the security of Wireless Networks, so how to research and guarantee Wireless Network security becomes a important task of the wireless network further development.First, the papers have carried in-depth analysis and research on the current wireless network security of WEP encryption algorithm and authentication mechanism, analysis the shortcomings of WEP encryption algorithm and the deficiencies of MAC address filtering,and that the MAC address filtering and WEP encryption algorithm can not guarantee the safety of the existing wireless network.Second, introducing 802.1x based on port authentication mechanisms and VPN tunnel encryption against MAC address filtering and WEP encryption algorithm inadequate.Next, in-depth research and analysis to the current field of wireless security model at home and abroad have conducted currently available from the analysis of the advantages and disadvantages of wireless network security model, a dynamic testing, dynamic two-way authentication. Dynamic allocation of the key concepts. These three factors constitute a dynamic security model, and from a theoretical point of view, to conduct a feasibility analysis.Finally, the design of the above and based on the dynamic security model, the concept of dynamic integration of security model. The assurance that the model of the wireless terminal expandability in the hand and ensure that the new wireless terminal applications and data transmission throughout the certification process are safe and reliable. In this security model based on the testing and certification, the model fully guarantee the security of the wireless network and a wireless network resources and the traditional cable network security visits. Modeling of wireless network security to...
Keywords/Search Tags:Dynamic Model, 802.1x, Security State, VPN
PDF Full Text Request
Related items