Font Size: a A A

Research Of Security Technology Based On Centralized WLAN Split MAC Architecture

Posted on:2008-02-12Degree:MasterType:Thesis
Country:ChinaCandidate:L Q LiuFull Text:PDF
GTID:2178360215458076Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Along with the development of WLAN technology, large deployments of wireless network has been become a trend. Nowadays, implementing a RSN is an optimal choice in large deployments of secure wireless network. WLAN network architecture adopts "thin access point" way, it provides centralized management mode, it is become to a research hotspot now.The paper aims at the research of secure technology problems based on the centralized WLAN network architecture. We analyzed WEP secure limitations, RSN network secure characteristics and TKIP encapsulation principles. In allusion to centralized WLAN architecture, we compared advantages and limitations of three MAC split modes. In these three modes, split MAC provides more convenient management mode, this mode is popular with most of manufacturers. The paper summarizes most of definitions used by manufacturers, and combines TKIP, and then gives a new split MAC method of RSN. We design a RSN implementation scheme based on the new centralized WLAN split MAC architecture, and implement TKIP. From system frame, module frame and module running flow aspects, we depict the implementation of software in centralized equipment. At last, we give the test results.Test results of software system indicated implementing TKIP in RSN criterion can preferably guarantee wireless network secure transmission. The system has already been applied to the broadband access equipment successfully, it can be a temporal confidentiality solving scheme.
Keywords/Search Tags:Centralized WLAN, Split MAC, RSN, TKIP, CCMP, IEEE802.11, IEEE802.11i
PDF Full Text Request
Related items