Font Size: a A A

Wlan Security Technology Research And Improvement

Posted on:2007-04-11Degree:MasterType:Thesis
Country:ChinaCandidate:Y F LiuFull Text:PDF
GTID:2208360185471727Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Wireless Local Area Net, i.e. WLAN, has successfully combined the advantages of both wireless communication and network techniques, which makes it easier to deploy and more convenient to use and becomes increasingly popular in different fields. However, because of the particularity and defect of its media, WLAN faces more eavesdropping and tamper threats on transmitting data compared to wire Local Area Net. As a consequence, it has become one of the important researches on the security of WLAN.Nowadays Wire Equivalent Privacy, i.e. WEP, is widely used to protect the security of WLAN, as a key technique, while its kernel RC4 arithmetic has been proved to have weaknesses. With the rapid development of WLAN, these problems have been exposed gradually, which leads WEP can not keep up with the security need of WLAN.Firstly this paper analyses the basic security condition of WLAN and the working principle of current WLAN security measures. Secondly, the basic principle and security hidden troubles of WEP security measure are detailedly studied, and some crack experiments through AirSnort on WEP protocol have been performed, base on the results of crack experiment, it is obviously proved that the WEP technique can not meet the security needs of WLAN any more. Thirdly, based on the security problem studies of WEP protocol, a new WLAN security ameliorative scheme is advanced. This ameliorative scheme still uses the principle of WEP, but ID authentication and key update technique are added, which is able to make up the defect of WEP on ID authentication and key management. Finally this ameliorative scheme is testified base on mathematics statistic principle, which leads to such a theory that the ameliorative scheme is able to affect the probability of key stream reuse though changing the cycle of key update, and enhance the security of WLAN eventually.As a result, under the circumstance of not updating hardwares, the ameliorative scheme is quite valuable used for reference on practice applications.
Keywords/Search Tags:WLAN, SSID, WEP, IV
PDF Full Text Request
Related items