期刊文献+
共找到913篇文章
< 1 2 46 >
每页显示 20 50 100
Security Analysis of Application Layer Protocols on Wireless Local Area Networks 被引量:1
1
作者 杨明豪 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第5期586-592,共7页
This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries l... This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries launch deauthentication flood attacks cutting users' connection, the connection managers will automatically research the last access point's extended service set identifier (ESSID) and then re-establish connection. However, such re-connection can lead the users to a fake access point with the same ESSID set by attackers. As the attackers hide behind users' access points, they can pass AL's authentication and security schemes, e.g. secure socket layer (SSL). We have proved that they can even spy on users' account details, passwords, data and privacy. 展开更多
关键词 man-in-the-middle (MITM) attacks session hijacking wireless local area network (WLAN)
原文传递
Application of Wireless Local Area Network Technology in Mobile Robot for Finned Tube Inspection
2
作者 王光荣 马培荪 +2 位作者 曹曦 孙红 李彦明 《Journal of Shanghai University(English Edition)》 CAS 2004年第2期180-186,共7页
This paper introduces a novel robot for outer surface inspection of boiler tubes. The paper describes the hardware system, wireless communication strategy, communication procedure and system software of the robot. The... This paper introduces a novel robot for outer surface inspection of boiler tubes. The paper describes the hardware system, wireless communication strategy, communication procedure and system software of the robot. The WLAN technology is used in the robot. It solves the problem of shielding generated by iron boiler and 11Mbps bandwidth made it possible for video and control stream real-time transmit within the same channel. Though TCP/IP protocol is robust, serial server is a transparent channel but cannot detect error and retransmit the data. In order to improve the reliability of serial communication, a new communication protocol is proposed. Key words boiler tubes - mobile robotics - wireless local area network Project Supported by the National High-Tech Program (Grant No. 2002AA420080) 展开更多
关键词 boiler tubes mobile robotics wireless local area network
在线阅读 下载PDF
Research on the Teaching Reform of "Wireless Local Area Network" in the Background of"Wireless Business Circle"
3
作者 Feng Zhang 《International Journal of Technology Management》 2017年第4期74-76,共3页
This paper proposes the teaching reform of the "Wireless Local Area Network" in the background of "Wireless Business Circle" . At present, WLAN technology is becoming more and more mature, the application is then ... This paper proposes the teaching reform of the "Wireless Local Area Network" in the background of "Wireless Business Circle" . At present, WLAN technology is becoming more and more mature, the application is then becoming more and more extensive, the campus network will grow rapidly on wireless LAN applications especially the research and higher education institutions on the wireless LAN demand is increasing with wireless LAN will have a very broad market development space. GIS business circle analysis model is to determine business enterprise location or expand their existing business outlets of information necessary to say on the map by G1S visual function of the model. This paper makes the combination of the mentioned items that will then and later influence the performance of the model. 展开更多
关键词 Teaching Reform wireless local area network wireless Business Circle.
在线阅读 下载PDF
Synchronization in Wireless Networks for Practical MIMO-OFDM Systems
4
作者 Muhammad Khurram Kiyani Muhammad Usman Ahmed Asim Loan 《International Journal of Communications, Network and System Sciences》 2010年第5期483-487,共5页
In this paper a frequency offset estimation technique for Wireless Local Area and Wireless Metropolitan Ar- ea Networks is presented. For frequency offset estimation, we have applied a low-complexity frequency offset ... In this paper a frequency offset estimation technique for Wireless Local Area and Wireless Metropolitan Ar- ea Networks is presented. For frequency offset estimation, we have applied a low-complexity frequency offset estimator for simple AWGN channels to fading channels for MIMO-OFDM systems. Simulation results have shown that the performance of the proposed estimator is better than the low complexity frequency offset estimator designed for AWGN channels. 展开更多
关键词 SYNCHRONIZATION MULTIPLE Input MULTIPLE Output Orthogonal Frequency Division Multiplexing wireless local area networkS wireless METROPOLITAN area networkS Stanford University Interim Channels
在线阅读 下载PDF
基于Snort-wireless的分布式入侵检测系统研究与设计 被引量:19
5
作者 黄俊强 方舟 王希忠 《信息网络安全》 2012年第2期23-26,33,共5页
为了解决无线局域网存在的安全隐患,该文设计了基于Snort-wireless的分布式入侵检测模型。该模型利用开源、免费和易于扩展的Snort-wireless实现客户端的网络入侵检测引擎,利用VC++开发了控制中心,并且采用加密的TCP/IP协议实现客户端... 为了解决无线局域网存在的安全隐患,该文设计了基于Snort-wireless的分布式入侵检测模型。该模型利用开源、免费和易于扩展的Snort-wireless实现客户端的网络入侵检测引擎,利用VC++开发了控制中心,并且采用加密的TCP/IP协议实现客户端与控制中心之间的安全通信。同时,该模型符合入侵检测的标准框架CIDF,使该模型在性能、重用性以及可扩展性方面得到保证。 展开更多
关键词 无线局域网 分布式入侵检测 Snort-wireless TCP/IP协议
在线阅读 下载PDF
Wireless-LAN安全及认证方法的研究与分析 被引量:1
6
作者 杨新宇 阳玉俭 徐庆飞 《计算机应用研究》 CSCD 北大核心 2008年第10期2889-2892,2916,共5页
首先介绍了无线局域网面临的安全问题,并对无线局域网的安全要求进行了分析;介绍了国内外Wire-less-LAN安全认证机制的研究现状,在此基础上详细分析了基于EAP的无线网络安全认证方法;最后对几种主要的认证方法进行了分析比较。
关键词 无线局域网 安全机制 认证方法 可扩展认证协议
在线阅读 下载PDF
Radio map updated method based on subscriber locations in indoor WLAN localization 被引量:1
7
作者 Ying Xia Zhongzhao Zhang Lin Ma 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2015年第6期1202-1209,共8页
With the rapid development of wireless local area network (WLAN) technology, an important target of indoor positioning systems is to improve the positioning accuracy while reducing the online calibration effort to o... With the rapid development of wireless local area network (WLAN) technology, an important target of indoor positioning systems is to improve the positioning accuracy while reducing the online calibration effort to overcome signal time-varying. A novel fingerprint positioning algorithm, known as the adaptive radio map with updated method based on hidden Markov model (HMM), is proposed. It is shown that by using a collection of user traces that can be cheaply obtained, the proposed algorithm can take advantage of these data to update the labeled calibration data to further improve the position estimation accuracy. This algorithm is a combination of machine learning, information gain theory and fingerprinting. By collecting data and testing the algorithm in a realistic indoor WLAN environment, the experiment results indicate that, compared with the widely used K nearest neighbor algorithm, the proposed algorithm can improve the positioning accuracy while greatly reduce the calibration effort. 展开更多
关键词 subscriber location wireless local area network(WLAN) positioning accuracy calibration effort hidden Markovmodel (HMM).
在线阅读 下载PDF
Domain adaptive methods for device diversity in indoor localization 被引量:1
8
作者 Liu Jing Liu Nan +1 位作者 Pan Zhiwen You Xiaohu 《Journal of Southeast University(English Edition)》 EI CAS 2019年第4期424-430,共7页
To solve the problem of variations in radio frequency characteristics among different devices,transfer learning is applied to transform device diversity to domain adaptation in the indoor localization algorithm.A robu... To solve the problem of variations in radio frequency characteristics among different devices,transfer learning is applied to transform device diversity to domain adaptation in the indoor localization algorithm.A robust indoor localization algorithm based on the aligned fingerprints and ensemble learning called correlation alignment for localization(CALoc)is proposed with low computational complexity.The second-order statistical properties of fingerprints in the offline and online phase are needed to be aligned.The real-time online calibration method mitigates the impact of device heterogeneity largely.Without any time-consuming deep learning retraining process,CALoc online only needs 0.11 s.The effectiveness and efficiency of CALoc are verified by realistic experiments.The results show that compared to the traditional algorithms,a significant performance gain is achieved and that it achieves better positioning accuracy with a 19%improvement. 展开更多
关键词 wireless local area networks indoor localization fingerprinting device diversity transfer learning correlation alignment
在线阅读 下载PDF
A Semi-Supervised WLAN Indoor Localization Method Based on l1-Graph Algorithm 被引量:1
9
作者 Liye Zhang Lin Ma Yubin Xu 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2015年第4期55-61,共7页
For indoor location estimation based on received signal strength( RSS) in wireless local area networks( WLAN),in order to reduce the influence of noise on the positioning accuracy,a large number of RSS should be colle... For indoor location estimation based on received signal strength( RSS) in wireless local area networks( WLAN),in order to reduce the influence of noise on the positioning accuracy,a large number of RSS should be collected in offline phase. Therefore,collecting training data with positioning information is time consuming which becomes the bottleneck of WLAN indoor localization. In this paper,the traditional semisupervised learning method based on k-NN and ε-NN graph for reducing collection workload of offline phase are analyzed,and the result shows that the k-NN or ε-NN graph are sensitive to data noise,which limit the performance of semi-supervised learning WLAN indoor localization system. Aiming at the above problem,it proposes a l1-graph-algorithm-based semi-supervised learning( LG-SSL) indoor localization method in which the graph is built by l1-norm algorithm. In our system,it firstly labels the unlabeled data using LG-SSL and labeled data to build the Radio Map in offline training phase,and then uses LG-SSL to estimate user's location in online phase. Extensive experimental results show that,benefit from the robustness to noise and sparsity ofl1-graph,LG-SSL exhibits superior performance by effectively reducing the collection workload in offline phase and improving localization accuracy in online phase. 展开更多
关键词 indoor location estimation l1-graph algorithm semi-supervised learning wireless local area networks(WLAN)
在线阅读 下载PDF
A PHEMT Based Wideband LNA for Wireless Applications 被引量:2
10
作者 Muhammad Saad Khan ZHANG Hongxin +2 位作者 HE Pengfei Sulman Shahzad Rahat Ullah 《China Communications》 SCIE CSCD 2015年第10期108-116,共9页
This work is about the development of a super low noise amplifier with minimum power consumption and high gain for several wireless applications.The amplifier operates at frequency bands of 0.9-2.4 GHz and can be used... This work is about the development of a super low noise amplifier with minimum power consumption and high gain for several wireless applications.The amplifier operates at frequency bands of 0.9-2.4 GHz and can be used in many applications like Wireless local area network(WLAN),WiFi,Bluetooth,ZigBee and Global System for mobile communications(GSM).This new design can be employed for the IEEE 802.15.4 standard in industrial,scientific and medical(ISM) Band.The enhancement mode pseudomorphic high electron mobility transistor PHEMT is used here due to its high linearity,better performance and less noisy operation.The common source inductive degeneration method is employed here to enhance the gain of amplifier.The amplifier produces a gain of more than 17 dB and noise figure of about 0.5 dB.The lower values of S11 and S22 reflect the accuracy of impedance matching network placed at the input and output sides of amplifier.Agilent Advance Design System(ADS) is used for the design and simulation purpose.Further the layout of design is developed on the FR4 substrate. 展开更多
关键词 low noise amplifier phemt advanced design system wireless local area network global positioning system
在线阅读 下载PDF
Adaptive rate control on wireless transcoder
11
作者 Chen Xudong Zhu Qingxin Liao Yong Fu Qingyun Xiong Guangze 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第3期633-640,共8页
To guarantee the real-time transmission of a video stream, based on the stochastic optimal control method, a frame layer adaptive rate control algorithm for the wireless transcoder is proposed, which is capable of dyn... To guarantee the real-time transmission of a video stream, based on the stochastic optimal control method, a frame layer adaptive rate control algorithm for the wireless transcoder is proposed, which is capable of dynamically determining the transcoder's objective bit rate, according to the bandwidth variation of the wireless channel and the buffer occupancy. Then the transient performance, steady performance, and computational complexity of the algorithm are analyzed. Finally, the experiment results demonstrate that the algorithm can improve the synthetic performance of rate control through the compromise between the end-to-end delay and the playout quality. 展开更多
关键词 streaming media rate control transcoder wireless local area network H.264/AVC.
在线阅读 下载PDF
Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network
12
作者 Abdallah Elhigazi Abdallah Mosab Hamdan +6 位作者 Shukor Abd Razak Fuad A.Ghalib Muzaffar Hamzah Suleman Khan Siddiq Ahmed Babikir Ali Mutaz H.H.Khairi Sayeed Salih 《Computers, Materials & Continua》 SCIE EI 2023年第3期5607-5623,共17页
IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local ... IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 protocol.Due to the data transmission nature of the wireless local area network(WLAN)through radio waves,its communication is exposed to the possibility of being attacked by illegitimate users.Moreover,the security design of the wireless structure is vulnerable to versatile attacks.For example,the attacker can imitate genuine features,rendering classificationbased methods inaccurate in differentiating between real and false messages.Althoughmany security standards have been proposed over the last decades to overcome many wireless network attacks,effectively detecting such attacks is crucial in today’s real-world applications.This paper presents a novel resource exhaustion attack detection scheme(READS)to detect resource exhaustion attacks effectively.The proposed scheme can differentiate between the genuine and fake management frames in the early stages of the attack such that access points can effectively mitigate the consequences of the attack.The scheme is built through learning from clustered samples using artificial neural networks to identify the genuine and rogue resource exhaustion management frames effectively and efficiently in theWLAN.The proposed scheme consists of four modules whichmake it capable to alleviates the attack impact more effectively than the related work.The experimental results show the effectiveness of the proposed technique by gaining an 89.11%improvement compared to the existing works in terms of detection. 展开更多
关键词 802.11 media access control(MAC) wireless local area network(WLAN) artificial neural network denial-of-service(DoS)
在线阅读 下载PDF
A NOVEL LINK ADAPTATION SCHEME TO ENHANCE PERFORMANCE OF IEEE 802.11G WIRELESS LAN
13
作者 Chen Liquan HuAiqun 《Journal of Electronics(China)》 2006年第3期350-354,共5页
A novel link adaptation scheme using linear Auto Regressive (AR) model channel estimation algorithm to enhance the performance of auto rate selection mechanism in IEEE 802.11g is proposed. This scheme can overcome t... A novel link adaptation scheme using linear Auto Regressive (AR) model channel estimation algorithm to enhance the performance of auto rate selection mechanism in IEEE 802.11g is proposed. This scheme can overcome the low efficiency caused by time interval between the time when Received Signal Strength (RSS) is measured and the time when rate is selected. The best rate is selected based on data payload length, frame retry count and the estimated RSS, which is estimated from recorded RSSs. Simulation results show that the proposed scheme enhances mean throughput performance up to 7%, in saturation state, and up to 24% in finite load state compared with those non-estimation schemes, performance enhancements in average drop rate and average number of transmission attempts per data frame delivery also validate the effectiveness of the proposed schelne. 展开更多
关键词 wireless local area network (WLAN) Link adaptation Channel estimation Auto rate selection Received Signal Strength (RSS)
在线阅读 下载PDF
Survey on security aspects of distributed software-defined networking controllers in an enterprise SD-WLAN
14
作者 Neena Susan Shaji Raja Muthalagu 《Digital Communications and Networks》 CSCD 2024年第6期1716-1731,共16页
Software-Defined Networking(SDN)improves network management by separating its control logic from the underlying hardware and integrating it into a logically centralized control unit,termed the SDN controller.SDN adapt... Software-Defined Networking(SDN)improves network management by separating its control logic from the underlying hardware and integrating it into a logically centralized control unit,termed the SDN controller.SDN adaptation is essential for wireless networks because it offers enhanced and data-intensive services.The initial intent of the SDN design was to have a physically centralized controller.However,network experts have suggested logically centralized and physically distributed designs for SDN controllers,owing to issues such as a single point of failure and scalability.This study addressed the security,scalability,reliability,and consistency issues associated with the design of distributed SDN controllers.Moreover,the security issues of an enterprise related to multiple physically distributed controllers in a software-defined wireless local area network(SD-WLAN)were emphasized,and optimal solutions were suggested. 展开更多
关键词 Software-defined networking(SDN)SDN controller Logically centralized SDN controller Physically distributed SDN controller Software-defined wireless local area network(SD-WLAN)
在线阅读 下载PDF
An adaptive joint source and channel coding scheme for H.264 video multicasting over wireless LAN 被引量:1
15
作者 LIU Zheng-ye LIU Hang WANG Yao 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第5期837-846,共10页
This paper proposes an adaptive joint source and channel coding scheme for H.264 video multicast over wireless LAN which takes into account the user topology changes and varying channel conditions of multiple users, a... This paper proposes an adaptive joint source and channel coding scheme for H.264 video multicast over wireless LAN which takes into account the user topology changes and varying channel conditions of multiple users, and dynamically allocates available bandwidth between source coding and channel coding, with the goal to optimize the overall system performance. In particular, source resilience and error correction are considered jointly in the scheme to achieve the optimal performance. And a channel estimation algorithm based on the average packet loss rate and the variance of packet loss rate is proposed also. Two overall performance criteria for video multicast are investigated and experimental results are presented to show the improvement obtained by the scheme. 展开更多
关键词 MULTICAST OVER 802.11 wireless local area networks (WLAN) Adaptive joint source and channel coding H.264
在线阅读 下载PDF
无线局域网多模态数据标签自适应标注方法
16
作者 陈琳 魏娟 《吉林大学学报(理学版)》 北大核心 2025年第3期878-884,共7页
针对无线局域网的动态性导致数据标签有效性随时间变化,需定期更新和重新标注数据,增加了数据标签标注难度的问题,提出一种无线局域网多模态数据标签自适应标注方法.首先,通过动态滑动邻近排序算法清洗重复的无线局域网多模态数据,利用... 针对无线局域网的动态性导致数据标签有效性随时间变化,需定期更新和重新标注数据,增加了数据标签标注难度的问题,提出一种无线局域网多模态数据标签自适应标注方法.首先,通过动态滑动邻近排序算法清洗重复的无线局域网多模态数据,利用循环神经网络融合多模态数据,获取更全面的数据信息.其次,将融合后的无线局域网数据划分为确定集和模糊集,采用支持向量机标注确定集数据标签,利用K-近邻(KNN)分类器标注模糊集数据标签,从而实现无线局域网多模态数据标签自适应标注.实验结果表明,该方法的重复数据删除率始终高于12%,一致指数为0.9928,平均绝对百分比误差为0.4539,ROC曲线更靠近坐标轴左上角,AUC值为0.9824,内存占用率始终低于10%,无线局域网多模态数据标签标注效果较好. 展开更多
关键词 无线局域网 多模态数据 标签标注 支持向量机 KNN分类器
在线阅读 下载PDF
Multi-AP Cooperative Radio Resource Allocation Method for Co-Channel Interference Avoidance in 802.11be WLAN
17
作者 Sujie Shao Zhengpu Wang +2 位作者 Siya Xu Shaoyong Guo Xuesong Qiu 《Computers, Materials & Continua》 2025年第9期4949-4972,共24页
With the exponential growth of mobile terminals and the widespread adoption of Internet of Things(IoT)technologies,an increasing number of devices rely on wireless local area networks(WLAN)for data transmission.To add... With the exponential growth of mobile terminals and the widespread adoption of Internet of Things(IoT)technologies,an increasing number of devices rely on wireless local area networks(WLAN)for data transmission.To address this demand,deploying more access points(APs)has become an inevitable trend.While this approach enhances network coverage and capacity,it also exacerbates co-channel interference(CCI).The multi-AP cooperation introduced in IEEE 802.11be(Wi-Fi 7)represents a paradigm shift from conventional single-AP architectures,offering a novel solution to CCI through joint resource scheduling across APs.However,designing efficient cooperation mechanisms and achieving optimal resource allocation in dense AP environment remain critical research challenges.To mitigate CCI in high-density WLANs,this paper proposes a radio resource allocation method based on 802.11be multi-AP cooperation.First,to reduce the network overhead associated with centralized AP management,we introduce a distributed interference-aware AP clustering method that groups APs into cooperative sets.Second,methods for multi-AP cooperation information exchange,and cooperation transmission processes are designed.To support network state collection,capability advertisement,and cooperative trigger execution at the protocol level,this paper enhances the 802.11 frame structure with dedicated fields for multi-AP cooperation.Finally,considering the mutual influence between power and channel allocation,this paper proposes a joint radio resource allocation algorithm that employs an enhanced genetic algorithm for resource unit(RU)allocation and Q-learning for power control,interconnected via an inner-outer dual-loop architecture.Simulation results demonstrate the effectiveness of the proposed CCI avoidance mechanism and radio resource allocation algorithm in enhancing throughput in dense WLAN scenarios. 展开更多
关键词 wireless local area network IEEE 802.11be multi-AP radio resource allocation
在线阅读 下载PDF
基于无线局域网的羽毛球球拍数据采集实验系统研究
18
作者 陈力 陈景源 +2 位作者 冯辉 丁汩越 卞永明 《实验室研究与探索》 北大核心 2025年第1期121-125,157,共6页
为提升羽毛球挥拍动作教学效率,提出一种基于无线局域网的羽毛球拍数据采集系统。通过AP+AC架构搭建无线局域网,实现基于Wi-Fi的球拍姿态数据采集;采用基于TCP协议设计羽毛球拍姿态数据传输程序。数据接收终端采用WebSocket通信,结合Ech... 为提升羽毛球挥拍动作教学效率,提出一种基于无线局域网的羽毛球拍数据采集系统。通过AP+AC架构搭建无线局域网,实现基于Wi-Fi的球拍姿态数据采集;采用基于TCP协议设计羽毛球拍姿态数据传输程序。数据接收终端采用WebSocket通信,结合Echarts和ThreeJS数据可视化,完成数据与虚拟球拍姿态的对应。该系统应用于专业运动员的训练,利用视频采集实现动作数据的对比分析。结果显示,该系统具备良好的实时性,可为羽毛球拍训练数据采集、运动特征提取及训练标准的建立提供支持。 展开更多
关键词 无线局域网 无线采集系统 实时展示界面 姿态数据对应 羽毛球拍
在线阅读 下载PDF
基于WAPI的电力物联网终端安全接入技术研究 被引量:1
19
作者 陈栩秋 郭飞 +2 位作者 王薇 吴飞 杨一 《自动化仪表》 2025年第6期33-37,共5页
由于我国电力物联网终端往往在复杂的网络环境中运行,接入过程中存在漏洞风险大、容易被恶意软件入侵导致信息泄漏等问题。为此,提出一种基于无线局域网鉴别和保密基础结构(WAPI)安全协议的电力物联网终端安全接入技术。分析电力物联网... 由于我国电力物联网终端往往在复杂的网络环境中运行,接入过程中存在漏洞风险大、容易被恶意软件入侵导致信息泄漏等问题。为此,提出一种基于无线局域网鉴别和保密基础结构(WAPI)安全协议的电力物联网终端安全接入技术。分析电力物联网面临的接入内外部攻击风险,利用WAPI安全协议集中管理接入任务,凭借接入用户的指示向量确定物联网终端接入信道容量,以适应复杂环境下的安全接入问题。为提高安全接入的效果,建立了认证双方的安全通信通道。通过哈希函数产生动态密钥,完成用户端与电力物联网终端的双向认证,有效地防范了信息泄漏和篡改等安全威胁,实现了物联网终端的安全接入。试验结果表明,所提技术资源消耗低,能有效完成电力物联网终端的接入,确保了用户数据的完整性与安全性。该研究可为电力物联网终端的安全接入提供参考。 展开更多
关键词 无线局域网鉴别和保密基础结构 安全协议 电力物联网 安全接入技术 漏洞风险 信息泄漏 双向认证
在线阅读 下载PDF
Security analysis of newly ameliorated WAPI protocol 被引量:3
20
作者 庞辽军 李慧贤 王育民 《Journal of Southeast University(English Edition)》 EI CAS 2008年第1期25-28,共4页
Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is ... Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is analyzed with the CK (Canetti-Krawczyk) model and the BAN (Burrows-Abadi- Needham) logic. Results show that it can achieve the alleged authentication and key negotiation goals. Besides those alleged, further analyses indicate that the authentication access process can satisfy other security requirements, such as mutual identity authentication, mutual key control, key confirmation, message integrity check, etc. If the used elliptic curve encryption algorithm and the hash algorithm are secure enough, the protocol can efficiently realize mutual authentication between STAs (station) and APs (access point). Therefore, WAPI can be applied to replace the security mechanism used in the original WLAN international standard to enhance its security. 展开更多
关键词 wireless local area network (WLAN) WLAN authentication and privacy infrastructure (WAPI) AUTHENTICATION key negotiation CK model
在线阅读 下载PDF
上一页 1 2 46 下一页 到第
使用帮助 返回顶部