Font Size: a A A

Research And Improvement Of Wrieless Network Security Technology

Posted on:2008-01-10Degree:MasterType:Thesis
Country:ChinaCandidate:W B WangFull Text:PDF
GTID:2178360212993595Subject:Systems analysis and integration
Abstract/Summary:PDF Full Text Request
Along with the popularization and application of the wireless network, it is increasing dependence on the wireless network.Comparing with the limitations of cable networks, the wireless network increases the mobility and productivity,that's the reason of the wireless network explosive growth. According to a survey of IT security company RSA Security, the number of wireless network access points , London rise by 57%, 20% increase in New York, Paris, the alarming growth of 119% in two years.But it's limited resource,such as weak wireless terminals computing power and storage capacity limitations,must be taken in to account in the design of security scheme.As the use of wireless networks increased, hacking enterprise networking opportunities have increased.Presently, the main approach used to provide data security in WLAN based on IEEE802.11 standards is WEP security mechanism.While fatal security problems exist in the original WEP, and these problems become more and more serious and make WEP unable to keep up with the current security requirements.For this point,many improved security protocols were proposed,such as TKIP, 802.1X, 802.11i, WPA and WAPI.In this paper we firstly anlysis wireless network security mechanisms, especially the basic principle of the WEP protocol, then describe the strengths and weaknesses of it's design,and the use of design defects attack, also gives some suggestions on how to prevent such attacks. Based on the analysis of WEP security holes, we propose an improved WEP (iWEP)mechanisms which achieves, in addition to its security goals, another security service which is replay detection. It is important to note that iWEP can be directly deployed over any hardware using WEP. It shows clearly advantages of iWEP: for a neglected computation overhead, iWEP guarantees perfectly all security services of the WEP.
Keywords/Search Tags:Wireless Network Security, WEP, 802.11 Protocal
PDF Full Text Request
Related items