Font Size: a A A

Research Of Wireless Local Area Networks Security Access Technology

Posted on:2012-06-24Degree:MasterType:Thesis
Country:ChinaCandidate:X H WuFull Text:PDF
GTID:2248330395955700Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Relying on its flexibility, mobility and enlarging capability, Wireless LANs makepeople enjoy the simple, convenient and fast network services. New applications basedon wireless networks put forward new requirements for wireless LANs. WLANs arefacing security challenges, because of its open channels. This paper has a deep analysisof security threats of the application-oriented WLAN, and studies the security accesstechnology, the concrete content as follows:This paper analyses IEEE802.11WLAN standards, indicates its problems whenapplied to new WLAN-based applications, and then designs a application-orientedwireless LANs model, abbreviated to AOWNM This model can finish the networksupdating without impacting on users, and it is useful to improve the popularization ofLWLAN; this paper analyses the security requirements and mechanisms of IEEE802.11,and designes a new wireless LAN access security model based on AOWNM, meetingthe security requirements of AOWNM on user management, identity authentication, keyagreement and accounting; this paper analyses the problems faced by exciting WLANaccess authentication technologies, and designes a CPK-based WLAN accesssauthentication protocol EAP-CAPW by using the mass key space and off-lineauthentication characters of CPK, for intra-domain handoff of mobile nodes, this paperdesigns the intra-domain fast re-anthentication protocol EAP-CAPW_M by optimizingEAP-CAPW and using the advance trust relationship, the efficiency and security ofEAP-CAPW and EAP-CAPW_M are analysed, and the result demonstrates that theycan meets the requirements of access security in the application-oriented WLAN; thispaper designs and implements a application-oriented wireless local networks accessauthentication system based on the above technologies. This system can be used toverify the correctness and effectiveness of AOWNM as well as the relativeauthentication protocols.
Keywords/Search Tags:Wireless Local Network, Access Security, Combined Public Key, Identity Authentication
PDF Full Text Request
Related items