Font Size: a A A

The Implementation Of Military WLAN Security

Posted on:2012-09-06Degree:MasterType:Thesis
Country:ChinaCandidate:Z CaiFull Text:PDF
GTID:2248330374489446Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
WLAN is already widely applied in different fields of economy, life and research for its convenience and efficiency. WLAN is changing our traditional ways of working and studying and make it available to achieve high quality services of voice, data and image in any time at anyplace. Based on WLAN’s characteristics that there are great space available in military communications. With the constant popularization of WLAN, the security of WLAN has been becoming a hot topic in the research of present computer networks. The paper based on the wireless self-organized network technology analyzes the functions of the security control mechanism of wireless stations access to WLAN, But it also describes that the authentication and encryption mechanism specified by IEEE802.11standard doesn’t provide enough security guarantees to WLAN, such as one-way authentication, WEP protocol and static key derivation which induce kinds of attacks to WLAN, and research Wireless network for crack experiment. There are two ways to ensure the security of WLAN, one is to improve the technology of Authentication, and the other is to use the Encryption. The paper mainly discusses the techniques of WLAN security informs of enhancing the IEEE802.1X Authentication and combines the Radius protocol and the Authentication of EAP-TLS together to improve the security in WLAN.The paper proposes the scheme of the user security management system, which is based on port access control standard IEEE802.1X. In addition, it provides mutual authentication via EAP-TLS protocol based on being verified with digital credentials between wireless station and network. It also adopts dynamic key derivation to realize security authentication, key management and data protection, etc. Meanwhile, it offers solutions of major technical schemes to WLAN security. Finally, according to Military WLAN requirements,it designs and realizes the integrated security architecture on the basis of IEEE802.1X protocol, EAP-TLS protocol and RADIUS protocol.
Keywords/Search Tags:WLAN, IEEE802.11, WEP, IEEE802.1X
PDF Full Text Request
Related items