期刊文献+

无线局域网安全协议的分析和研究 被引量:3

Analysis and Research on Security Protocol of Wireless LAN
下载PDF
导出
摘要 文章阐述了无线局域网几类安全协议的技术标准、发展历程,介绍了无线局域网的安全标准WEP、802.11i和802.11w的安全保障机制,重点分析了WEP、802.11i和802.11w标准应用中存在的安全问题以及可能的典型攻击方式,最后提出了加强无线局域网安全的措施。 This paper describes several types of security protocols technology standards、development process for wireless LAN, describes the wireless LAN security standards WEP, 802.11i and 802.11w security mechanism analyzes the WEP, 802.11i standard applications and 802.11w existing security Typical problems and possible attacks, finally proposed to strengthen the wireless LAN security measures.
作者 张蕾 郑飞
机构地区 上海市公安局
出处 《信息网络安全》 2014年第9期132-137,共6页 Netinfo Security
关键词 安全协议 安全机制 攻击方式 security protocols security mechanisms attacks
  • 相关文献

参考文献7

  • 1802.11 iTM IEEE Standard for Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Specific requirements Part 11 :Wireless LAN Medium Access Control(MAC)and Physical Layer(PHY)specifications Amendment 6 : Medium Access Control (MAC) SecurityEnhancements [R|.
  • 2Bernard Aboba, Ashwin Palekar. IEEE 802. Ix and RADIUSSecurity.doc : IEEE 802.11—01 / 657r0,Nov. 2001[R].
  • 3Snehasish Parhi,Attacks Due to Flaw of Protocols Used In NetworkAccess Control (NAC), Their Solutions and Issues: A Survey, I.J[J].Computer Network and Information Security, pp. 31—46,Mar.2012.
  • 4Valli Kumari, Krishnam Raju K, Formal verification of IEEE802.llw authentication protocol[C]. 2nd International Conference onCommunication, Computing & Security [ICCCS-2012], pp. 716— 722.
  • 5Agrawal R, Kieman J. Watermarking Relational Databases[C]. Proc.of the 28th Conference on Very Large Databases. Hong Kong, China :[s.n.], 2002.
  • 6贺旭娜,阴东锋.基于802.11的无线局域网加密协议脆弱性研究[J].洛阳师范学院学报,2012,31(8):79-81. 被引量:3
  • 7孙宏,杨义先.无线局域网协议802.11安全性分析[J].电子学报,2003,31(7):1098-1100. 被引量:23

二级参考文献8

  • 1任伟,无线网络安全[M].北京:电子工业出版社,2011.1-10.
  • 2ISDN0-7381-1812-5. Wireless LAN Medium Access Control (MAC)and Physical Layer (PHY) Specifications ANSI/IEEE. Std 802. 11[s].
  • 3Bruce Schneier. Applied Cryptography[M]. USA: Wiley, 1997.
  • 4E Dawson, L Nielsen. Automated cryptanalysis of XOR plaintext strings[J]. Cryptologia, 1996, (2) : 165 - lSl.
  • 5N Borisov, L Goldberg, David Wagner. Intercepting mobile communications:The insecurity of 802.11 [A] .Proc of 7th Annual Int.Conf. Mobile Computing and Networking 2001 Papers [C]. Rome, Italy: ACMCN,2001.
  • 6S Fluhrer, I Mantin, A Shamir. Weaknesses in the key scheduling algorithm of FC4 [A]. Preliminary Draft [C]. Canad.a: CRYPTO,2001.
  • 7ISDN0-7381-2927-5. IEEE. Standard for Local and Metropolitan area networks---Port-Based Network Access Control, IEEE. Std 802.1x-2001 [S].
  • 8Krawezyk H, Bekkare M, Canetti R. HMAC: Keyed-Hash for Message Authentication [Z].RFC 2104,February 1997.

共引文献24

同被引文献21

  • 1徐静,常朝稳.SSL协议的安全性分析[J].微计算机信息,2006,22(03X):19-21. 被引量:9
  • 2王垚,胡铭曾,李斌,闫伯儒.域名系统安全研究综述[J].通信学报,2007,28(9):91-103. 被引量:26
  • 3CHENG Ningning, WANG Xinlei, CHENG Wei, et al.Characterizing Privacy Leakage of Public Wi-Fi Networks for Users onTravel[C]// IEEE.INFOCOM, 2013 Proceedings IEEE, April 14-19,2013.Turin,Italy. NJ:IEEE,2013:2769-2777.
  • 4HASTINGSN E,MCLEAN P A.TCP/IP SpoofingFundamentals[C]// IEEE.Computers and Communications,1996.,Conference Proceedings of the 1996 IEEE Fifteenth AnnualInternational Phoenix Conference on, March 27-29, 1996. Scottsdale,AZ, USA. NJiIEEE, 1996:218-224.
  • 5WANGShaoqiang, XU Dongsheng, YAN Shiliang. Analysis andApplication of Wireshark in TCP/IP Protocol Teaching[C]// IEEE.E-health Networking, Digital Ecosystems and Technologies (EDT),2010International Conference on, April 17 - 18,2010. Shenzhen,China.NJiIEEE, 2010(2):269-272.
  • 6经信局.《信息安全技术公共及商用服务信息系统个人信息保护指南》已编制完成[EB/OL]. http://www.hengshan.gov.cn/main/zfxxgk/xxgkml/gzdt/zwdt/c7bb9a5c-9fd5-4c9f-al34-f2617651bb72.shtml,2012-07-18.
  • 7吕高锋,孙志刚,卢锡城.域间IP欺骗防御服务净化机制[J].计算机学报,2009,32(3):552-563. 被引量:9
  • 8任江,袁宏春.对SSL协议及其安全性分析[J].电子科技大学学报,1998,27(4):416-420. 被引量:20
  • 9张慧.Wi-Fi无线局域网安全协议分析[J].湖北第二师范学院学报,2011,28(2):55-58. 被引量:2
  • 10顾翔,张臻,邱建林.无线安全协议设计方法研究[J].计算机科学,2011,38(9):103-107. 被引量:1

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部