Font Size: a A A

Research And Implementation Of WAPI Authentication Mechanism

Posted on:2008-08-13Degree:MasterType:Thesis
Country:ChinaCandidate:X Q QinFull Text:PDF
GTID:2178360242499193Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
As its supporting mobile computing, flexibility and convenience, Wireless Local Area Network (WLAN) is widely used. However, opening wireless transmission brings some security vulnerabilities into WLAN, such as data is easily eavesdropped, intercepted and modified, as well as Denial of Services and masquerading attacks are easily mounted. So, it's necessary for us to focus on the research of security mechanism of WLAN.Based on analyzing the network features and security requirements of WLAN, this paper researches deeply on the authentication mechanism of WAPI, which has independent knowledge property right and proposed by our country . The main tasks and innovations as follow:In order to solve the security problems, upon analyzing the network architecture of WLAN and its working mode, vulnerabilities of WLAN are summarized and classified, and security requirements of WLAN are pointed out.In the latest infrastructures of two main WLAN standards - IEEE 802.11i and WAPI, the infrastructures of WAPI is analyzed mainly which is self-owned intellectual property rights in our country, and vulnerabilities and shortcomings in WAPI are pointed out, which include not really realize authentication of STA, inefficient authentication, sources-costly computation and DoS attacks brought up with the design of protocols, which influence the availability of WLAN. In order to solve these problems, some improved schemes and method are proposed that could improve the security, availability and computation efficiency of WAPI.The improved key agreement protocol is analyzed by using formal method, and its accuracy is proofed by using BAN logic.The protocol proposed in the paper can implement source authentication and integrity protection, and the realization of key-updating is more secure.Authentication server (AS) system is designed and accomplished with the introduction of multiple-threads and multiple-cache techniques. It has been verified that the designed AS system is effective and available through experiment and emulation.
Keywords/Search Tags:WLAN, Authentication Protocol, WAPI, Key-updating, BAN Logic
PDF Full Text Request
Related items