期刊文献+

IEEE 802.11的WEP算法安全性浅析 被引量:5

Security Analysis of WEP Algorithm Used in IEEE 802.11
下载PDF
导出
摘要 本文简要介绍了IEEE 80 2 .11无线局域网的安全保证算法———WEP算法 ,指出了该算法的安全性漏洞 ,并针对这些漏洞给出了对其实施攻击的方式。随后介绍了它的改进版本TKIP算法对WEP存在问题的对策。最后提出了一些现有设备使用中提高安全性的解决措施。 The WEP security algorithm used in IEEE 802.11 wireless LAN is introduced. Under the basis of a systematical analysis, flaws embedded in WEP are pointed out, and correspondingly, several attacking methods are provided to prove the weakness of WEP. The upgraded version of WEP algorithm-TKIP was also introduced and analyzed. At last, some potential solutions to the security problems are also proposed in using existing IEEE 802.11 equipments.
出处 《无线通信技术》 2003年第4期36-39,共4页 Wireless Communication Technology
关键词 IEEE802.11 WEP算法 安全性 无线局域网 TKIP算法 IEEE 802.11 WEP TKIP Security
  • 相关文献

参考文献8

  • 1LAN MAN Standards Committee of the IEEE Computer Society. Wireless LAN medium access control ( MAC ) and physical layer ( PHY ) specifications IS]. IEEE Standard 802. 11, 1999 Edition, 1999.
  • 2B Schneier. Applied Cryptography (2nd Addition)[M]. Wiley, 1997.
  • 3A J Menezes, P C van Orschot, and S A Vanstone. Handbook of Applied Cryptography[M].CRC Press, 1996.
  • 4Scott Fluhrer, Itsik Mantin, and Adi Shamir.Weaknesses in the Key Scheduling Algorithm of RC4[J]. Eigh Annual Workshop on Selected Areas in Cryptography,August 2001.
  • 5E Dawson and L Nielsen. Automated cryptanalysis of XOR plaintext strings[M]. Cryptologia, 1996.
  • 6IEEE 802. 11 Tgi. St. Louiss, Missouri. Proposed TGi D1. 8 Clause 8Changes [EB/OL]. http://grouper. ieee. org/groups/802/11/Reports/tgi-update, htm.
  • 7Niels Ferugson , MacFergus. Michael an improved MIC for 802. 11 WEP[C]. Document submitted to IEEE 802.11 WG. January 2002.
  • 8Christian Barnes, Tony Bautts, etc. Hack Proofing Your Wireless Network[M]. Syngress Press .2002.

同被引文献14

  • 1李勤,张浩军,杨峰,张全林.无线局域网安全协议的研究和实现[J].计算机应用,2005,25(1):160-162. 被引量:48
  • 2王茂才,戴光明,宋军,胡汉平.无线局域网的安全性研究[J].计算机应用研究,2007,24(1):158-160. 被引量:44
  • 3LAN MAN Standards Committee of the IEEE Computer Society. Wireless LAN medium access control (MAC) and physical layer (PHY) specifications [s].IEEE Standard 802.11,1999 Edition,1999.
  • 4Sultan Weatherspoon.Overview of IEEE802.1 lb security[J].Intel Technology Journal,2000.
  • 5Nikita Borisov, Ian Goldberg, David Wagner. Intercepting mobile communications: the Seventh Annual International Conferccne on Mobile Computering and Networking,2001.16-21.
  • 6Scott Fluhrer,Itsik Mantin,Adi Shamir. Weaknesses in the Key Scheduling Algorithm of RC4 [J].Eigh Annual workshop on Selected Areas in Cryptography,August 2001.
  • 7CLIPS Reference Manual.http://www.ghg.net/clips. 2002(3).
  • 8王建辉,李晓辉,薛鑫.移动通信中的安全问题[J].网络安全技术与应用,2009(7):57-61. 被引量:2
  • 9石兴方,孙树峰,苏鹏,顾君忠.无线局域网安全机制研究[J].计算机应用研究,2003,20(6):135-138. 被引量:7
  • 10吴志军,马兰.IEEE 802.11安全算法WEP[J].中国民航学院学报,2003,21(4):33-38. 被引量:1

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部