期刊文献+

无线局域网安全性研究 被引量:6

Research on WLAN Security
在线阅读 下载PDF
导出
摘要 首先阐述WEP在保障无线局域网安全性方面的不足,并指出从认证,接入控制,数据加密等方面构建强壮的无线安全体系的方法。最后对AES-CCMP和ECC算法对802.11数据帧的加密情况进行了比较和分析。 This paper gives some details on why WEP is not good enough at WLAN security assurance and then analyzes how to strengthen the security of WLAN from the three aspects, that is, authorization, access control and data encryption and decryption. At last, gives the comparison of AES - CCMP and ECC on the encryption of 802.11 data frame.
出处 《微处理机》 2009年第3期43-45,48,共4页 Microprocessors
  • 相关文献

参考文献3

二级参考文献26

  • 1.无线局域网媒体访问控制和物理层规范[S].[S].,..
  • 2.无线局域网产品密码算法应用规范(版本2.0)[S].[S].,2003..
  • 3ANSI/IEEE Std 802.11. Information technology- Telecommunications and information exchange between systems- Local and metxopolitan area networks-- Specific recoirements- Part 1 1: Wireless LAN Medium Access Conta'ol (MAC) and Physical Layer(PHY)Specifications[S].
  • 4IEEE Std 802.11 i/D3.0. Draft Supplement to STANDARD FORT-elecommunications and Information Exchange Between Systems -LAN/MAN Specific Requirements - Part 11: Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: Specification for Enhanced Security[ S].
  • 5RFC 2138. Remote Authentication Dial In User Service(RADIUS)[S].
  • 6IEEE Std 802.1 x. IEEE Standard for Local and metropolitan area networks-Port-Based Network Access Control[ S].
  • 7ANSI/IEEE Std 802.11. Information technology-- Telecommunications and information exchange between systems-- Local and metropolitan area networks-- Specific requirements-- Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer(PHY)Specifications[ S].
  • 8IEEE Std 802.11i/D3.0. Draft Supplement to STANDARD FORT-elecommunieafions and Information Exchange Between Systems -LAN/MAN Specific Requirements - Part 11: Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: Specification for Enhanced Security[ S].
  • 9IEEE Std 802.1 x. IEEE Standard for Local and metropolitan area networks--Port-Based Network Access Control[ S].
  • 10B Aboba et al. PPP EAP TLS Authentication Protocol[S].RFC2716

共引文献55

同被引文献29

  • 1陈卓,王瑞民.TKIP的MIC-Michael算法和安全性分析[J].计算机工程与设计,2006,27(7):1149-1150. 被引量:3
  • 2王茂才,戴光明,宋军,胡汉平.无线局域网的安全性研究[J].计算机应用研究,2007,24(1):158-160. 被引量:44
  • 3李宇,缪海燕.改进基于WEP协议的无线局域网的安全[J].计算机应用,2007,27(B06):250-251. 被引量:3
  • 4陈伟 郑天祯.无线网络的安全分析与防范.计算机技术与应用,2008,20(2):100-104.
  • 5802.1 1.Wireless LAN medium access control(MAC)and physical layer(PHY)specifications[S].IEEE,1999.
  • 6802.11i/D5.0.August 2003 Medium Access Control(MAC)Seeurlty Enhancements[S].IEEE,2003.
  • 7SITHIRASENAN E, MUTHUKKUMARASAMY V D. IEEE 802. 11i WLAN security protocol-a software en_gineerrs model [C]// Proceedings of the 4th Asia Pacific Security Conference on Information Technology. Australia: SCIT, 2005:39-50.
  • 8SITHIRASENAN E, MUTHUKKUMARASAMY V. An early warning system for IEEE 802. lli wireless networks[C]// Proceedings of the 1st Australian Conference on Broadband Wireless and Ultra Wideband. Australian: BWUW, 2006: 25-30.
  • 9新浪网美国零售业巨头TJX公司4500万顾客资料外泄[EB/OL].http://newssina.com.cn/w/2007-03-30/145112655775.shtml.
  • 10Stubblefield A,Ioannidis J,Rubin A D.Using the Fluhrer,Mantin and shamir Attack to Break WEP.AT&T labs Teehnical Report TD-4ZCPZZ,Revision 2,August 21,2001.

引证文献6

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部