Font Size: a A A

Research On The Access Control Technology Of WLAN Security Applications

Posted on:2015-01-11Degree:MasterType:Thesis
Country:ChinaCandidate:G X YanFull Text:PDF
GTID:2268330425476164Subject:Information security
Abstract/Summary:PDF Full Text Request
In recent years, with the popularization of intelligent terminals with WLAN capabilities, the WLAN communication developed rapidly. But due to WLAN security mechanisms problems, the information leak accidents still continue to occur. It is clear that the WLAN security issues are worrisome. In particular, these places, such as the national key units, classified department, important meeting places, etc., is also paid special attentions to the problem of WLAN security.Firstly, the WLAN security hierarchy is described. The existent threats of WLAN were analyzed from the perspective of security and confidentiality and pointed out the specific threats that exist in confidential environment.Secondly, the general ideas to solve the problem of wireless security and domestic and international laws and regulations on confidentiality environment about WLAN security are studied. Combined with WLAN own characteristics, a comprehensive WLAN access control scheme is presented, including de-authentication or disassociation algorithms to control specific STA or the AP and channel occupancy algorithm to block on a single channel, or the entire WLAN.Again, the details of what the access control scheme to achieve are discussed. The hardware solution is consisted of control board, blocking plate and scanning plates,on each board incorporating a microprocessor (MCU), dynamic memory (SDRAM), flash memory (FLASH), LAN card (LAN). A customized WLAN cards and Microstrip Antennas are connected with the blocking plate and scanning plate. In the software implementation of access control system, C/S structure is used between the control board and the functional board, through the Socket communication mechanism. The B/S structure is used between the control board and PC, which provides users to set access control system easily through website.Finally, the test targets and test methods of the system are put forward and a performance test to the access control system prototype has been made. The test results suggest that the system is fully able to meet the current confidential environment requirements for WLAN security threats.
Keywords/Search Tags:WLAN, security, block technology, access control scheme
PDF Full Text Request
Related items