Font Size: a A A

Study Of Testing Technologies For WLAN Security Protocol And Implementation Of The Testing Systems

Posted on:2012-07-08Degree:MasterType:Thesis
Country:ChinaCandidate:K CaiFull Text:PDF
GTID:2248330395455490Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Because the protocol design is increasingly complex and the problems of networksecurity become more and more serious currently, the protocol testing technology hasbecome a necessary and very important part in the process of protocol implementation.The emphases on testing the WLAN security protocols are conformance and security.Therefore, this paper does research in conformance testing and security testing.On the conformance testing part, this paper does research in active testing anddesigns the plan of the active testing firstly: This paper uses the finite state machinemodel to provide formal description for the security protocol under test. Based on thecharacteristic of the protocol under test, this paper designs the test scenarios, and usesan improved T algorithm to generate the test sequence. Then this paper proposes ascalable architecture of conformance active testing for WLAN security protocol, andan active testing system is implemented on the basis of this architecture. This systemadopts the thoughts for separating foreground display from background test cases,which has advantages of scalability and reusability. Finally, a new authenticationprotocol for WLAN secure access is tested, and the result is given.On the security testing part, this paper investigates the existing security methods,and divides them into two aspects of robust testing and protocol attack testing. Aimingat these two aspects, this paper selects three typical atomic attacks testing plans:perturb attacks, replay attacks and fake AP attacks. Then based on the architecture ofactive testing system, a security testing system is designed and implemented. Thissystem is scalable and easy to use, testers can construct new attack testing plans byadding test cases themselves. Finally, the test cases of above mentioned atomic attacksare developed, and a new authentication protocol for secure access is tested using thesecurity testing system.
Keywords/Search Tags:WLAN security protocol, Conformance testing, Active testing, Security testing
PDF Full Text Request
Related items