期刊文献+

WIFI热点与预共享密钥安全性分析 被引量:4

Security Analysis for WIFI Hotspots and PSK
下载PDF
导出
摘要 本文分析了目前国内WIFI热点设备与预共享密钥的安全情况。首先利用一种已知设备漏洞对国内部分WIFI热点(AP)进行了安全扫描,发现该漏洞虽然已公布了较长时间,但依然存在于众多WIFI热点当中;然后通过扫描获取的PSK进行分析,发现国内WIFI热点中有很大比例采用了安全性较低的预共享密钥(PSK),甚至不采用预共享密钥,此类安全风险不容忽视。建议设备厂商及用户共同提高安全意识,尽快修复相关漏洞并采用高安全级别预共享密钥。 This paper discusses the security level of domestic WIFI APs and their Pre- Shared Keys( PSK). Firstly,with a well-known device vulnerability to scan some domestic WIFI APs and find that although made public for a fairly long time,this vulnerability still exists in many WIFI APs. And the analysis on the scanning indicates a fairly large proportion of WIFI APs adopt a weak PSK or even no PSK,and such security risks cannot be ignored. It is recommended that the equipment manufacturers and users should raise their security awareness,fix the vulnerability and adopt high security- level PSK as soon as possible.
出处 《信息安全与通信保密》 2016年第5期100-103,共4页 Information Security and Communications Privacy
关键词 无线网络安全 WIFI密码安全 AP安全 网络扫描 安全分析 wireless network security WIFI PSK security AP security network scan security analysis
  • 相关文献

参考文献20

  • 1Kevin Benton. The Evolution of 802.11 Wireless Security, UNLV lnformatics-Spring, 2010.
  • 2IEEE 802.1 l-1997: IEEE Standard for Information Technolo- gy - Telecommunications and Information Exchange between Systems-Local and Metropolitan Area Networks-Specific Re- quirements - Part Ⅱ: Wireless LAN Medium Access Control(MAC) and Physical Layer (PHY) Specifications. IEEE Standards, 1997.
  • 3William A. Arbaugh. An huluc'tive Chosen Plaintext Attack a- gainst WEP/WEP2, IEEE Document 802. 11- 01/230, 2001-05.
  • 4Wi-Fi Protected Access (WPA), WikiPedia: http:// en, wikipedia.org/wiki/Wi-Fi_Protected_Access.
  • 51EEE 802. l li- 2LL4: Amendment 6: Medium Access Control (MAC) Security Enhancenlents, IEEE Standards, .2(X)4-07-23.
  • 6Fluhrer, S., Mantin, I., and A. Shamir, Weaknesses in the Key Scheduling Algorithm of RC4, Selected Areas of Cryptog- raphy, SAC 2001, LNCS Vol. 2259, pp 1-24, 2001.
  • 7David W. et ak Security Flaws in 80C2.11 Data Link Protocols, Communications of tile AC2d, Vol. 46, No. 5, 2003, pp. 35-39.
  • 8Erlk T.et al. Breaking 104 bit WEP in less titan 60 seconds, Information Security Applications, LNCS 4867, 2007, pp 188-202.
  • 9Achilleas T. et al. Exposing WPA2 security protocol vulnera- bilities, Information and Computer Security, 2014 Vol.6, No. 1, pp.93-107.
  • 10Aircrack-ng: http ://www.aircrack -ng.org/.

同被引文献34

引证文献4

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部