期刊文献+

基于IEEE802.11b标准的无线局域网安全研究

Research into Security of WLAN Based on IEEE802.11b
下载PDF
导出
摘要 分析了基于国际电器和电子工程师委员会(InstituteofElectricalandElectronicsEngineer,IEEE)802.11b标准的无线局域网的加密算法(WiredEquivalentProtorcol,WEP)存在的安全漏洞,针对各自的缺陷详细地提出了改进措施,并对802.11x/EAP(扩展认证协议),无线局域网鉴别和保密基础结构(WlanAuthenticationandPrivacyIntranstructure,WAPI)等安全协议从认证、加密、完整性校验等方面进行了较深入地研究,指出了单一技术不能解决安全问题,应结合多种措施与技术来建立多层次的安全体系结构,最后提出了一种企业局域网的安全解决方案。 This paper analyses the WEP security mechanism of WLAN based on IEEE802. 11b, discusses the security solutions and technologies of WLAN in detail, deeply studies the authentication, key exchange, confidentiality mechanism of the wireless security protocols, such as 802.11x/ EAP and WAPI, and finally proposes an enterprise application of WLAN.
作者 蒋建军
出处 《上海电机学院学报》 2006年第2期30-33,共4页 Journal of Shanghai Dianji University
关键词 无线局域网 加密算法 扩展认证协议(EAP) 虚拟专用网 虚拟局域网 wireless local area network (WLAN) wired equivalent protocol (WEP) extensible authentication protocol (EAP) virtual private network (VPN) virtual local area network (VLAN)
  • 相关文献

参考文献5

  • 1朱道飞,汪东艳,陈前斌,隆克平.无线局域网的安全协议分析[J].计算机工程与应用,2005,41(9):162-164. 被引量:10
  • 2[2]Arunesh Mishra,Bill Arbaugh.An Initial analysis of the 802.1x standard[EB/OL].(2005-07-09)[2006-01-10].http://www.cs.umd.edu/~waa/1x.pdf.
  • 3[3]Matthew S Gast.802.11 Wireless Networks:The Definitive Guide[M].清华大学出版社,2002:99-113.
  • 4张帆,马建峰.WAPI认证机制的性能和安全性分析[J].西安电子科技大学学报,2005,32(2):210-215. 被引量:29
  • 5[6]Fazal L,Ganu S,Kappes M,et al.Tackling security vulnerabilities in VPN-based wireless deployments[J].IEEE International Conference on Communications,2004,6(1):20-24.

二级参考文献24

  • 1B Aboba et al. PPP EAP TLS Authentication Protocol[S].RFC2716
  • 2Paul Funk et al. EAP Tunneled TLS Authentication Protocol[S].draft-ietf-pppext-eap-ttls-04.txt, 2004-04
  • 3T Wu.The SRP Authentication and Key Exchange System[S].RFC2945
  • 4D Taylor et al. Using SRP for TLS Autbentication[S].draft-ieff-tls-srp-06,2004-01-27
  • 5P Eronen Ed et al. Diameter Extensible Authentication Protocol Application[S].draft-ieff-aaa-eap-06.txt, 2004-05-28
  • 6Arbaugh W A,Shankar N,Wan Y C J.Your 802.11 network has no clothes[J].IEEE Wireless Communications,2002;9(6):44~51
  • 7Newsham. Cracking WEP Keys.http://www.lava.net/~newsham/wlan/WEP_password_cracker.ppt,Black Hat Biiefings,2001-08
  • 8Fluhrer,Mantin,Shamir. Weaknesses in the Key Scheduling algorithm of RC4[M].2001-08
  • 9Mattbew S Gast.802.11 Wireless Networks The Definitive Guide[M].清华大学出版社
  • 10N Borisov,L Goldberg,David Wagner. Intercepting mobile communications:The insecurity of 802.11[C].In:Proc of 7th annual Int Conf Mobile Computing and Networking 2001 Papers, Rome, Italy: ACMCN, 2001

共引文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部