Font Size: a A A

The Key Technologies Of Wireless Lan Security Certification

Posted on:2005-04-02Degree:MasterType:Thesis
Country:ChinaCandidate:K MaFull Text:PDF
GTID:2208360152466853Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the great development of WLAN in recent years, its security has become the focus people most attention. As IEEE802.11, which is the major standard in WLAN market now, has great security leak, it cannot provide enough security. This paper, which is the part of the 863- project "WLAN security technique", studies the essential authentication technique of WLAN security.Firstly, this paper introduces the basic knowledge of 802.11 WLAN and analyzes the security demand of WLAN. Then the paper introduces the security techniques that were written in 802.11 protocol 1999 edition, and summarizes the security leaks in it. According to these above, we clarify the requirement of the paper's works.Secondly, according to the suggestion of IEEE802.11TGi Task Group's draft, this paper introduces the WLAN security authentication system frame and detailedly discusses the two protocols: EAP protocol and 802.1x protocol. Then we demonstrate the necessity of using this framework.EAP is a general protocol for PPP authentication which supports multiple authentication mechanisms. The paper discusses the protocol of EAP, including protocol flow and frame format. After the detailed introduction of EAP-MD5 and EAP-SIM, we conclude the advantages of EAP. IEEE 802.1x is a port-based network access control protocol. The thesis outlines the procedure of the authentication process, frame format and illustrates the implementation of EAP in it. And then we conclude the protocol's advantages. As a part of security authentication, the study also covers the operations of the key management and key descriptor. The 4-way handshake also presented in detail.Finally, the paper gives the design and implementation of the 802.1x's authenticator and supplicant. Then the project of authentication system and practical framework is introduced. The thesis also illustrate the state machine, software flow and essential technique.
Keywords/Search Tags:WLAN, Security, Authentication, 802.1X, EAP Four-Way-Handshake
PDF Full Text Request
Related items