期刊文献+

802.11WLAN中WEP安全漏洞分析及其对策 被引量:2

Security Weakness Analysis and Strategy for WEP Used in 802.11 WLAN
下载PDF
导出
摘要 本文研究了802.11无线局域网中WEP协议的加密、解密过程,深入分析了WEP存在的安全缺陷及可能受到的各种攻击;在此基础上,结合今后网络设计的高安全性需求,提出了防范攻击的安全措施。 This paper studies the process of encryption and decryption for WEP (Wired Equivalent Privacy) protocol used in Wireless Local Area Network, the Security Weakness and several potential attacking methods are analyzed deeply to proved the flaws embedded in WEP; Under the basis of a systematical analysis, considering the high security requirements of network design in the further, some solutions to the attacking problems are also proposed.
出处 《微电子学与计算机》 CSCD 北大核心 2005年第2期132-135,共4页 Microelectronics & Computer
基金 北京电子科技学院资助项目(YZDJ0414)
关键词 802.11WLAN WEP 安全漏洞 Wireless local area network, WEP, Security weakness
  • 相关文献

参考文献8

  • 1LAN MAN Standards Committee of the IEEE Computer Society. Wireless LAN medium access control (MAC) and physical layer (PHY) specifications [s].IEEE Standard 802.11,1999 Edition,1999.
  • 2Sultan Weatherspoon.Overview of IEEE802.1 lb security[J].Intel Technology Journal,2000.
  • 3Nikita Borisov, Ian Goldberg, David Wagner. Intercepting mobile communications: the Seventh Annual International Conferccne on Mobile Computering and Networking,2001.16-21.
  • 4Scott Fluhrer,Itsik Mantin,Adi Shamir. Weaknesses in the Key Scheduling Algorithm of RC4 [J].Eigh Annual workshop on Selected Areas in Cryptography,August 2001.
  • 5陶玲妹,邹燕秋.WEP的安全脆弱性与802.11系列无线网安全的实现[J].广西梧州师范高等专科学校学报,2003,19(4):70-74. 被引量:2
  • 6CLIPS Reference Manual.http://www.ghg.net/clips. 2002(3).
  • 7吴志军,马兰.IEEE 802.11安全算法WEP[J].中国民航学院学报,2003,21(4):33-38. 被引量:1
  • 8邢新景,张朝阳,王匡.IEEE 802.11的WEP算法安全性浅析[J].无线通信技术,2003,12(4):36-39. 被引量:5

二级参考文献20

  • 1Arbaugh W A. An inductive chosen plaintext attack against WEP/WEP2[Z].IEEE Document 802.11-01/230,2001.
  • 2Arbaugh W A,Shankar N,Wan Y J.Your 802.11 wireless network has no clothes[EB/OL].http://www.cs.umd.edu/waa/wireless.pdf, 2001-03/2003-03.
  • 3Simon D,Aboba B,Moore T.IEEE 802.11 security and 802.1X[Z]. IEEE Document 802.11--00/034r1, 2000.
  • 4Walker Jesse R. Unsafe at any key size: An analysis of the WEP encapsulation[Z]. IEEE Document 802.11--00/362,Intel Corporation, 2000.
  • 5Rivest R L. The RC4 Encryption Algorithm[Z]. MA,USA:RSA Data Security Inc, 1992.
  • 6Sultan Weatherspoon. Overview of IEEE 802.11b security[J].Intel Technology Journal,2000.
  • 7Nikita Borisov,Ian Goldberg, David Wagner. Intercepting mobile communications:the security of 802.11[R]. Los Angeles,CA:Proceedings of the Seventh Annual International Conference on Mobile Computering and Networking,2001.16--21.
  • 8Miller S K.Facing the challenge of wireless security[J]. IEEE Computer Magzine, 2001,34(7) : 16-18.
  • 9Russell S F. Wireless network security for users[R].Los Angeles,CA:Proceedings of Seventh Annual International Conference on Mobile Computing and Networking,2001. 172--177.
  • 10Prasad A R, Moelard H,Kruys J. Security architecture for wireless LANs: corporate and public environment[R].Tokyo:IEEE Vehicular Technology Conference Proceedings.2000.283--287.

共引文献5

同被引文献4

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部