Font Size: a A A

Research On The Identity Authentication In WLAN System

Posted on:2016-09-21Degree:MasterType:Thesis
Country:ChinaCandidate:S Y WenFull Text:PDF
GTID:2308330473961057Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
With the current rapid development of computer technology and communication technology, the requirements of modern mobile communication technology, the data transmission rate, data transmission reliability are also enhanced. Especially in recent years, the rapid rise of mobile TV and network television increased the demand for more high-speed data transfer rates. For Wireless local area network(LAN), because of the high mobility, simple networking, convenient management and extension ability, high throughput, etc.It has become the people preferred mobile network, to its own advantages to become the mainstream of modern communication technology and the future society. But due to the particularity of media used by WLAN transmission data- it is to use wireless electromagnetic waves in the open space data information transmission, in this space, any user can through wiretapping and other means to get the data information. Therefore, the way of data transmission WLAN determines that it existences a lot of security problems, these problems restrict the development of wireless communication technology. The identity authentication technology as the first barrier of WLAN security has a great significance to ensure that data in WLAN security and has very important position in the WLAN. Therefore, study of identity authentication techniques to ensure the safety of the WLAN system is particularly important.This paper analyzes of the knowledge of the WLAN and sum up the security problem of WLAN system. According to the WLAN security requirements in the system, analyzes the identity authentication in WLAN system certification process, the paper focuses on the certification between wireless mobile terminal and wireless access point in WLAN system. Focuses on analysis of the current access authentication between mobile terminal and wireless access points to three ways WEP, EAP TLS and WAPI, and summarized their safety defects and the method for solving these defects.According to the research of the above three kinds of identity authentication scheme analysis, combined with the high security of the elliptic curve cryptosystem and the advantages of zero knowledge proof of zero knowledge, designed a in WLAN system for wireless mobile terminals and the identity authentication scheme between the wireless access point. The scheme using elliptic curve cryptosystem and introduces the ideas of zero knowledge proof which is a kind of based on the elliptic curve zero knowledge proof of identity authentication scheme. Combine with a hash function in the process of certification, to effectively protect the certification evidence information interaction between the parties. This scheme can effectively complete the wireless mobile terminal and wireless access point between the bidirectional, dynamic, dominant certification. Two aspects of efficiency and safety has made analysis On the performance of the scheme.
Keywords/Search Tags:WLAN, ECC, Zero-knowledge Proof, Authentication
PDF Full Text Request
Related items