Font Size: a A A

Study On WLAN Security And Technology

Posted on:2008-02-27Degree:MasterType:Thesis
Country:ChinaCandidate:X Z LiuFull Text:PDF
GTID:2178360215990652Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the rapid development of computer network, WLAN was applied to various fields widely for its flexible removing and high transmitting rate. WLAN is wireless media transmitting with open channel, therefore it has higher security requirement than that with wire. The security of WLAN is more highly demanded due to its rapid development.At present a series of security problems of IEEE802.11 was uncovered. There are security leaks in existence by several authentication methods: open authentication is a useless one, which can not protect the network; the sharing key authentication is also far from perfect; as for the authentication based on ESSID, which was proclaimed in writing, therefore illegal accessing can also access to the protected network and it can not be prohibited by the authentication technology on basis of network names; the authentication technology which based on MAC address filtration can not guarantee the security of WLAN due to faking illegal MAC address. The WLAN in market mostly realized data encrypted and integral protected by wire equivalence secrecy protocol WEP, which adopted RC4 encrypting algorithm, can not guarantee the security and integrality of data. The shortcomings of WEP protocol in design attracted the attention of IEEE, and 802.11i group was assigned to set new standard to enforce the security of WLAN. Therefore a new standard was put forwarded by IEEE in Jule, 2004.802.11i standard was aimed at meeting the requirement of WLAN security, and it generally protect WLAN security by encrypting data, accessing authentication control and key management, which enabled data transmit in wireless network safely. 802.11i adopted TKIP or CCMP encrypting mechanism; and 802.11x standard and EAP protocol as well as RADIUS protocol was applied in it also. 802.11i standard adopted the 4th handshaking protocol and multicast key handshaking protocol to realize key management. It's safe to say that 802.11i standard enforced the security of WLAN from every aspect, and there is no security leak was found until now.In the last part of this thesis, the security threats, the security requirements and mechanism of systemic exchange between 3G mobile network and WLAN was particularly analyzed as well as the security mechanism of 3G systems, and the accessing authentication interconnection between 3G system and WLAN system was analyzed in details. In this thesis, the security technology of present WLAN was analyzed deeply which aimed at solving the problems of WLAN at present, especially security technology that had great influence at home and abroad, there is also a new approach which probes into the security of interconnection of 3G mobile network and WLAN as well.
Keywords/Search Tags:WLAN(Wireless local-area network), WEP technology, ID authentication, Data encryption
PDF Full Text Request
Related items