Font Size: a A A

Security Analysis Of IEEE802.11i In Wireless Local Area Network

Posted on:2013-09-17Degree:MasterType:Thesis
Country:ChinaCandidate:Kol PhannaFull Text:PDF
GTID:2248330374489684Subject:Computer Application Technology
Abstract/Summary:PDF Full Text Request
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security protocol, the IEEE802.1li assures rigid security for wireless networks with the support of IEEE802.1X protocol for authentication, authorization and key distribution.IEE802.11i standard was suggested for wireless security. Wireless security is an important problem; it is the prevention of unauthorized access or damage to computers using wireless networks. Wireless technology has increased as the service has become more popular, so that about first point is security that must be concerned.This topic also describe about IEEE802.11standard, the first standard of WLAN technology. And the weak point was modified by a new standard, called IEEE802.11i.This thesis focuses on Wireless Security with IEEE802.11i. It involves many changes, including the addition of advance encryption cipher AES and better key management functionality. IEEE802.11i-2004or802.11i is an amendment to the original IEEE802.11, to enhance the better security in wireless LAN security and It is suitable for the present WLAN.It’s working to enhance the Wired Equivalent Privacy (WEP) by using Temporal Key Integrity Protocol (TKIP), WEP technologies used for the WLAN security, it was modified by WPA2an IEEE802.11i, WAP2provides AES-CCMP encryption algorithm.Our study is to analyze the Robust Security Network, the new algorithm which comes to replace the PreRSN by IEEE802.11i. RSN provide the new security especially data confidentiality and integrity. AES was proposed by Rijndael, It protects from the one who try to access a network without permission, namely a hacker with strong security by using CCMP based AES Encryption mode. It also tried to mitigate the now-enormous amount of threats that were making wireless networking a real risk for companies.We also take a new algorithm which is different from Rijndael to compare. That new algorithm use200bits block size having200bits key size when the Rijndael algorithm operates on128bits block size and128bits key size.
Keywords/Search Tags:Counter-mode/CBC-MAC Protocol, Temporal Key IntegrityProtocol, Advanced Encryption Standard, Rijndael algorithm
PDF Full Text Request
Related items