Font Size: a A A

Research And Improvement Of Wireless LAN Security Technology

Posted on:2019-01-16Degree:MasterType:Thesis
Country:ChinaCandidate:G X XuFull Text:PDF
GTID:2428330566470986Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
There are many advantages of wireless LAN,such as flexible networking,convenient mobility,and extensible protocols,etc.But at the same time,this technology not only makes people's daily lives more convenient and faster,but also brings people's lives with hidden dangers.Hackers can enter the WLAN through special means,and illegally obtain the personal information of the user.Therefore,how to ensure the security of the WLAN is the key point of the current work.The writer has conducted an in-depth analysis of the encryption methods of various protocols in the evolution of WLAN protocols.In terms of data integrity and communication confidentiality,the algorithm used for data encapsulation and privacy in IEEE protocols has been a detailed study.This paper aims at the current WLAN security protocol,analyzes its specific development and improvement process,and conducts in-depth research on representative protocols.From a technical perspective,it conducts analysis of encryption and decryption processes,lists the advantages and disadvantages of each security protocol.Then it uses experiments to crack the password,verifying the WEP protocol and the 802.11 i protocol's design flaws.By focusing on the 4-way handshake process of 802.11 i protocol,it proves the 4-step handshake process design is more rigorous,and makes illegal user's authentication impossible.But owing to Message 1's plaintext transmission,it makes some attacks possible.In addition,it allows multiple handshake instances to run at one time,both causing memory-depleted DoS attacks and CPU-depleted DoS attacks.Afterwards,several existing solutions to solve the 4-step handshake problem are compared.Based on this,this paper proposes the message 1 authentication mechanism and the STA active protection mechanism.Experimental outputs prove that WLAN can resist DoS attacks and DoS flooding attacks.
Keywords/Search Tags:Wireless Local Area Networks, secure protocol, 802.11, DoS attack
PDF Full Text Request
Related items