期刊文献+

无线局域网中Wi—Fi安全技术研究 被引量:6

Wi-Fi Security Technology Research in WLAN
下载PDF
导出
摘要 随着无线局域网技术的快速发展,Wi—Fi作为移动设备的无线联网技术应用的越来越广泛。但无线局域网采用电磁波作为信息传播的载体,信息很容易被窃听或干扰,面临着严峻的网络安全问题。该文通过对无线局域网中安全问题的学习,研究了主要的Wi—Fi安全技术,并提出对应的解决方案。 With the rapid development of WLAN technology, Wi-Fi is applied more and more widely as wireless networking technology in mobile equipment. But WLAN transmission information through the electromagnetic wave that information is easy to be eavesdropped and disturbed, facing the severe network security problems. Through the study of WLAN security issues in this article, researches mainly Wi-Fi security technology, and puts forward corresponding solutions.
作者 凡星 刘培奇 FAN Xing, LIU Pei-qi (School of Information and Control Engineering, Xi'an Univ. of Arch. and Tech., Xi'an 710055, China)
出处 《电脑知识与技术》 2012年第3期1513-1515,共3页 Computer Knowledge and Technology
关键词 无线局域网 Wi—Fi 网络安全 WLAN Wi-Fi network security
  • 相关文献

参考文献4

二级参考文献17

  • 1王茂才,戴光明,宋军,胡汉平.无线局域网的安全性研究[J].计算机应用研究,2007,24(1):158-160. 被引量:44
  • 2王玲,吕伟.IEEE802.11无线局域网技术及安全性研究[J].电脑开发与应用,2007,20(2):9-10. 被引量:17
  • 3LAN MAN Standards Committee of the IEEE Computer Society. Wireless LAN Medium Access Control(MAC) and Physical Layer(PHY) Specifications[S]. 1999.
  • 4Bittau A, Handley M, Joshua L. The Final Nail in WEP's Coffin[C]//Proc. of IEEE Symposium on Security and Privacy. [S. l.]: IEEE Computer Society, 2006: 386-400.
  • 5Tews E, Ralf-Philipp W, Pyshkin A. Breaking 104 Bit WEP in Less than 60 Seconds[EB/OL]. (2007-12-13). http://eprint.iacr.org/.
  • 6Tews E. Attacks on the WEP Protocol[EB/OL]. (2007-10-13).www.cdc.in formatik.tu-darmstadt.de/reports/reports/Erik_Tews.dipl om. pdf.
  • 7Problem with HTTP[Z]. (2007-11-22). http://www.aircrack-ng.org.
  • 8Kore K. Chopcho'p(Experimental WEP Attacks)[EB/OL]. (2004-08- 23). http://www.netstumbler.org/showthread.php?t= 12489.
  • 9Arbaugh W A. An Inductive Chosen Plaintext Attack Against Wep/Wep2[EB/OL]. (2001-10-24). http://www.cs.umd.edu/-waa/ attaek/frame.Htm.
  • 10Fluhrer S R, Mantin I, Shamir A. Weaknesses in the Key Scheduling Algorithm of RC4[M]//Vaudenay S, Youssef A M. Selected Areas in Cryptography 2001. [S. l.]: Springer, 2001.

共引文献6

同被引文献21

引证文献6

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部