Font Size: a A A

The Study Of Key Technologies For Evaluating Wlan Security Protocols

Posted on:2011-03-20Degree:MasterType:Thesis
Country:ChinaCandidate:J T GaoFull Text:PDF
GTID:2198330332488191Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
The development of WLAN security protocol lacks effective methods for performance and conformance testing. While network simulation technology can give objective assessment of protocol performance, conformance testing is able to check the conformance between implementation and specification of protocols. This paper does research in key technologies of WLAN security protocol evaluating, including network simulation and conformance testing.This paper has proposed a system of simulation and evaluation of WLAN security protocol as well as an interface for extending new security protocols. Based on the study of the wireless station model of OPNET, this paper has implemented a simulation platform for WLAN security protocols. Taking the test of WEP protocol for example, this paper has analyzed the statistic results, verifying the effectiveness of this platform.To meet the requirements of conformance testing of EAP series protocol, this paper has proposed a scalable architecture of passive conformance testing for EAP protocols. This paper takes the finite state machine as the basis for formal description of security protocols. First, a general method of packet filtering is suggested. Second, a reverse method to reconstruct FSM from captured data packets is proposed. Third, an analysis algorithm of comparing FSM is given in this paper. Finally, the effectiveness of this conformance testing system is verified by testing an authentication protocol for secure access.
Keywords/Search Tags:WLAN security protocol, protocol simulation, conformance testing, passive testing
PDF Full Text Request
Related items