期刊文献+

IEEE 802.11安全算法WEP 被引量:1

Security Algorithm WEP of IEEE 802.11
下载PDF
导出
摘要 摘要:有线等价协议WEP是在IEEE802.11标准中采用的信息保密机制,它主要用于保障无线局域网络中链路层信息数据的保密。对WEP的工作机理进行了分析,重点对其安全性能进行了研究,并发现WEP不能对无线局域网中的数据提供可靠的保护。最后,提出了对WEP进行改进的建议。 The IEEE802.11standard for wireless networks includes a Wired Equivalent Priva-cy(WEP)protocol,which is used to protect link-layer communications from eavesdropping and other attacks.We have discovered several serious security flaws in the protocol,stem ming from misapplication of cryptographic primitives.The flaws lead to a number of practical at-tacks that demonstrate that WEP fails to achieve its security goals.In this paper,we analyse in detail the WEP,emphasis on its security,and propose modify recommendations to WEP.
作者 吴志军 马兰
出处 《中国民航学院学报》 2003年第4期33-38,58,共7页 Journal of Civil Aviation University of China
基金 中国民航总局教育教学研究基金项目(2001-3-7)
关键词 有线等价协议 IEEE802.11标准 信息安全 无线局域网 WEP IEEE802.11standard information security wireless LAN
  • 相关文献

参考文献12

  • 1Arbaugh W A. An inductive chosen plaintext attack against WEP/WEP2[Z].IEEE Document 802.11-01/230,2001.
  • 2Arbaugh W A,Shankar N,Wan Y J.Your 802.11 wireless network has no clothes[EB/OL].http://www.cs.umd.edu/waa/wireless.pdf, 2001-03/2003-03.
  • 3Simon D,Aboba B,Moore T.IEEE 802.11 security and 802.1X[Z]. IEEE Document 802.11--00/034r1, 2000.
  • 4Walker Jesse R. Unsafe at any key size: An analysis of the WEP encapsulation[Z]. IEEE Document 802.11--00/362,Intel Corporation, 2000.
  • 5Rivest R L. The RC4 Encryption Algorithm[Z]. MA,USA:RSA Data Security Inc, 1992.
  • 6Sultan Weatherspoon. Overview of IEEE 802.11b security[J].Intel Technology Journal,2000.
  • 7Nikita Borisov,Ian Goldberg, David Wagner. Intercepting mobile communications:the security of 802.11[R]. Los Angeles,CA:Proceedings of the Seventh Annual International Conference on Mobile Computering and Networking,2001.16--21.
  • 8Miller S K.Facing the challenge of wireless security[J]. IEEE Computer Magzine, 2001,34(7) : 16-18.
  • 9Russell S F. Wireless network security for users[R].Los Angeles,CA:Proceedings of Seventh Annual International Conference on Mobile Computing and Networking,2001. 172--177.
  • 10Prasad A R, Moelard H,Kruys J. Security architecture for wireless LANs: corporate and public environment[R].Tokyo:IEEE Vehicular Technology Conference Proceedings.2000.283--287.

同被引文献7

  • 1LAN MAN Standards Committee of the IEEE Computer Society. Wireless LAN medium access control (MAC) and physical layer (PHY) specifications [s].IEEE Standard 802.11,1999 Edition,1999.
  • 2Sultan Weatherspoon.Overview of IEEE802.1 lb security[J].Intel Technology Journal,2000.
  • 3Nikita Borisov, Ian Goldberg, David Wagner. Intercepting mobile communications: the Seventh Annual International Conferccne on Mobile Computering and Networking,2001.16-21.
  • 4Scott Fluhrer,Itsik Mantin,Adi Shamir. Weaknesses in the Key Scheduling Algorithm of RC4 [J].Eigh Annual workshop on Selected Areas in Cryptography,August 2001.
  • 5CLIPS Reference Manual.http://www.ghg.net/clips. 2002(3).
  • 6邢新景,张朝阳,王匡.IEEE 802.11的WEP算法安全性浅析[J].无线通信技术,2003,12(4):36-39. 被引量:5
  • 7陶玲妹,邹燕秋.WEP的安全脆弱性与802.11系列无线网安全的实现[J].广西梧州师范高等专科学校学报,2003,19(4):70-74. 被引量:2

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部