Font Size: a A A

Research WLAN Security Protocol Analysis And Attack Methods

Posted on:2016-10-03Degree:MasterType:Thesis
Country:ChinaCandidate:H B L A B D L H MaFull Text:PDF
GTID:2308330476450607Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
As the IEEE802.11 standard issued, wireless local area network(wireless local area network, WLAN) got rapid development. In recent years, WLAN in every field of life to the popularization and application is very broad. Such as education, health care, etc. Today our life is closely connected with the Internet, we train tickets and ticket reservation, order online, shopping and so on. In order to meet the communication needs of users, the hot spot of the WLAN coverage everywhere in the streets, public places such as cinemas, restaurants, cafes, and so on, campus places such as laboratory, dormitory, library and so on. With the rapid development of wireless local area network, its security problem has become increasingly prominent, in order to solve the security problem of wireless networks to satisfy the security needs of the people, The relevant departments to formulate the relevant agreements and solutions.WLAN security concerns with the use of the relevant agreement has a direct or indirect contact, in the past, the use of WEP protocol in the beginning of design do not thoughtful, the agreement have flaws, leak will cause potential safety hazard. Secondly, the user access to the so-called free Wi-Fi unknown in real life, resulting in an indirect security of user data leakage. This paper introduces the main agreement and IEEE802.11 series of WLAN, and then analyzes the security of wireless local area network(LAN) standards, WEP, WPA, such as step 4 handshake protocol. The research shows that there are some loopholes in WEP(such as key stream reuse, one-way authentication mechanisms, etc.), step 4 handshake protocol with large time delay, WPA is not an ideal security framework. The author made the corresponding attack experiment, analyzes the advantages and disadvantages of WLAN four agreement put forward step 2 handshake protocol, this method not only reduces the time delay in the process of shaking hands, and enhance the safety of the secret key negotiation stage.
Keywords/Search Tags:wireless local area network, WEP, WPA, step 4 handshake, attack, fast switching
PDF Full Text Request
Related items