Font Size: a A A

Research Of Trusted Network Connect Model In Wireless Local Area Networks

Posted on:2013-03-30Degree:MasterType:Thesis
Country:ChinaCandidate:Q M ZhangFull Text:PDF
GTID:2248330377459104Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
with the rapid development of social economy and the spread of the Internetapplications,Wireless network has been widely used and increasing concerned by manycountries for its agility、mobility、convenient deployment and low cost. Compare to thetraditional Ethernet networks, the new wireless network is more vulnerable to securityattack due to lack of safety norms and their own physical properties.At present, the widely used wireless networksafety standardsIEEE802.11i only paidattention to authenticate the user identity and ignored to authenticate the safety problem ofthe access terminal device.It cannot effectively resist potential security threats. In this paper,we studied the trusted access authentication modelunder the WLAN environment against thethreaten of malicious terminal device to wireless Network base on trusted Network Connecttechnology and802.11i safety standards. This provided enhanced security for wirelessnetworks.In this paper, we treated the IEEE802.11wireless local area network(WLAN) asresearch object. Firstly, we analyzed the potential security threats that wireless networkfaced,and secondly introduced the WLAN safety standardsIEEE802.11,including theIEEE802.1X based on port access control technology and Extensible AuthenticationProtocol(EAP). At last, we introduced the trusted network connection framework of thetrusted computing group(TCG), including trusted platform module TPM and the entity、layers and protocols involved in the framework.Based on the analysis of the existing TNC model and the characteristicof WLAN, westudied a TNC authentication model under the WLAN environment by combining thetrusted network connection framework with802.1X access control technology. Accordingto the difference of the access terminal device, we provideddifferent levels of securityprotection.The safety analysis showed that the design of the certification program was ableto meet the security needs of the wireless network.Finally, according to the proposed TNC authentication program, we implement atrusted access prototype system by the use of OSS. The test results showed that the systemachieved the desired objectives.
Keywords/Search Tags:WLAN, 802.1X, TNC, TPM
PDF Full Text Request
Related items