期刊文献+

无线局域网的安全协议分析 被引量:10

The Analysis of Wireless LAN Security Protocol
下载PDF
导出
摘要 论文从无线网络安全协议WEP的原理入手,深入分析了WEP的数据加密机制在机密性、完整性、验证等方面存在的缺陷,针对WEP协议的可能攻击,并结合现有的无线安全解决方案对WEP协议安全性改进方法进行了阐述。 This paper introduces the theory of WEP,then analyses the flaws of WEP in confidentiality,integrity,and authentication.Finally,the enhanced methods of WEP security are discussed combining with the mainstream wireless security solutions.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第9期162-164,185,共4页 Computer Engineering and Applications
基金 国家863高技术研究发展计划项目(编号:2003AA121540) 重庆市教委科学技术研究项目(编号:050310)
关键词 无线局域网 WEP WPA 802.11i Wireless Local Area Network(WLAN),Wired Equivalent Privacy(WEP),WPA,802.11i
  • 相关文献

参考文献17

  • 1Arbaugh W A,Shankar N,Wan Y C J.Your 802.11 network has no clothes[J].IEEE Wireless Communications,2002;9(6):44~51
  • 2Newsham. Cracking WEP Keys.http://www.lava.net/~newsham/wlan/WEP_password_cracker.ppt,Black Hat Biiefings,2001-08
  • 3Fluhrer,Mantin,Shamir. Weaknesses in the Key Scheduling algorithm of RC4[M].2001-08
  • 4Mattbew S Gast.802.11 Wireless Networks The Definitive Guide[M].清华大学出版社
  • 5N Borisov,L Goldberg,David Wagner. Intercepting mobile communications:The insecurity of 802.11[C].In:Proc of 7th annual Int Conf Mobile Computing and Networking 2001 Papers, Rome, Italy: ACMCN, 2001
  • 6孙宏,杨义先.无线局域网协议802.11安全性分析[J].电子学报,2003,31(7):1098-1100. 被引量:23
  • 7Welch D,Lathrop s. Wireless Security Threat Taxonomy[C].In:Information Assurance Workshop,IEEE Systems,Man and Cybernetics Society, 2003: 76~83
  • 8.[EB/OL].http://airsnort.sourceforge.net/,.
  • 9.[EB/OL].http://soureeforge.net/projects/weperack/,.
  • 10Jesse R Walker. Unsafe at any key size;An analysis of the WEP encapsulation. IEEE Document: 802.11-00/362,2000-10

二级参考文献7

  • 1ISDN0-7381-1812-5. Wireless LAN Medium Access Control (MAC)and Physical Layer (PHY) Specifications ANSI/IEEE. Std 802. 11[s].
  • 2Bruce Schneier. Applied Cryptography[M]. USA: Wiley, 1997.
  • 3E Dawson, L Nielsen. Automated cryptanalysis of XOR plaintext strings[J]. Cryptologia, 1996, (2) : 165 - lSl.
  • 4N Borisov, L Goldberg, David Wagner. Intercepting mobile communications:The insecurity of 802.11 [A] .Proc of 7th Annual Int.Conf. Mobile Computing and Networking 2001 Papers [C]. Rome, Italy: ACMCN,2001.
  • 5S Fluhrer, I Mantin, A Shamir. Weaknesses in the key scheduling algorithm of FC4 [A]. Preliminary Draft [C]. Canad.a: CRYPTO,2001.
  • 6ISDN0-7381-2927-5. IEEE. Standard for Local and Metropolitan area networks---Port-Based Network Access Control, IEEE. Std 802.1x-2001 [S].
  • 7Krawezyk H, Bekkare M, Canetti R. HMAC: Keyed-Hash for Message Authentication [Z].RFC 2104,February 1997.

共引文献22

同被引文献41

引证文献10

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部