Font Size: a A A

Implementation Of Auto Configured Based On WPS

Posted on:2009-02-03Degree:MasterType:Thesis
Country:ChinaCandidate:H Y ZhouFull Text:PDF
GTID:2178360272965361Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of wireless network, the security mechanism becomes more safer and more and more people are willing to use the wireless network. Among the users, about 40 % of the users have not protected their network, which makes their network absolutely open. If they do that, they will have no secrets and are easily attacked by hackers. Due to the fatalness, the Wi-Fi organization releases the WPS at the beginning of 2007, which can make users safely surf on the wireless network by easy steps. On the basis of deeply analyzing the architecture of WPS and registration protocol of WPS, combining with the technology of AP, this text realizes transporting WPS's source code on AP's architecture and successfully achieves a method of applying WPS.First, this paper deeply analyzes the realated knowledge about WPS, emphasing on 802.1x,UPnP protocol,Diffie-Hellman and HMAC-SHA-256 which are used in this text and compares PIN method with PBC method and initially analyzes the registration protocol and how to join the network.Second, WPS's source code will be transported to AP's architecture, emphasing on realizing the two WPS's configuration methods and discussing the key point during the realizing process.Then, on the basis of WPS's two configuration methods, a WPS's auto configured system will be put forward and realized under the Ureapte mode.At last, it gives a test of WPS's configuration methods and analyzes the result, which shows that WPS's source code successfully transports to AP's architecture and WPS can be achieved on AP.
Keywords/Search Tags:WPS, AP, code transporting, security mechanism, registration protocol
PDF Full Text Request
Related items