Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering and Applications》 2004-02
Add to Favorite Get Latest Update

Improve the Security of Wireless Local Area Network(WLAN)

Zhao Peng 1 Luo Ping 1 Cao Xuewu 21 (Department of Computer Science&Technology,Tsinghua University,Beijing100084) 2 (Department of Computer Science&Technology,Beijing University of Aeronautics and Astronautics,Beijing100083)  
Currently,the infrastructure of most WLANs supports IEEE802.11 1 standard or802.11b 2 standard.However,there are many securtiy flaws in the Wired Equivalent Privacy(WEP)protocol,which is described in IEEE802.11stan-dard and802.11b standard as the encryption protocol and authentication protocol.After summarizing most kinds of the flaws ,we bring forward two solutions to make up them and improve the security of WLAN.One,which demands little modification of the current infrastructure of WLAN,is an improved temporary solution.The other one is completely new,which applies to the new-built infrastructure of WLAN.
【Fund】: 国家973基础研究规划项目资金资助(编号:G1998030420)
【CateGory Index】: TN925.93
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 5 Hits
1 ;A Closed Look to IEEE 802.11i[J];Information Technology & Standardization;2004-11
2 ZHANG Zong-fu(Jiangmen Vocational and Technical College,Jiangmen,Guangdong 529000,China);WLAN Security Issues and Solutions[J];Computer Security;2011-06
3 TU Jun,ZHANG Ying-jiang,HUANG Qin-ju(School of Computer,Hubei Univ.of Technology,Wuhan 430068,China);The Safety of WLAN[J];Journal of Hubei University of Technology;2006-04
4 Zhang Hao Wang Peidong Wang Yan(Dept.of Computer Science and Technology,Harbin University of Science and Technology,Harbin 150080);Application of Adjacent Bits XOR Arithmetic of Key Replacement Based on WEP Protocol[J];Computer & Digital Engineering;2010-03
5 CHEN He,CAO Ke;Technology Research and Management for WLAN's Security[J];Modern Machinery;2006-04
Chinese Journal Full-text Database 10 Hits
1 DENG Lin;Comparison of WLAN security technology[J];Telecommunication Construction;2003-03
2 YU He-wei~1, LAI Sheng-li~1, YU Ai-min~1, CHEN Yi-tian~2 (1.College of Electronic & Information Engineering,South China University of Technology,Guangzhou 510640,China; 2.Guangdong Provincial College for Technical Personnel,Guangzhou 510640,China);Synchronization Algorithm for OFDM Based Standard IEEE802.11a[J];Telecommunication Engineering;2004-02
3 ZHANG LongJun*1,2,3, ZHANG Ming4 ( 1.Dept. of Comput. Sci. & Eng., Shanghai Jiaotong Univ., Shanghai 200030, China; 3.Dept. of Commun. Eng., Eng. College of Armed Police Force, Xi′an 710086, China; 4.Serv. Cent. of Combust. Gas & Heating Power of Xi′an, Xi′an 710082, China );Research on secure mechanism of WLAN in IEEE802.11[J];Journal of Dalian University of Technology;2003-S1
4 Zhou Ximin(Tongji University, Shanghai 200092, China);Analysis of the Present Situation of Network Security in China and Our Proposal[J];Telecommuni Cations Information;2004-10
5 Li Lin , Li Hui (Key Laboratory of Computer Networks and Information Security, Xidian Unibersity, Xi’an 710071, China);Reseach on security of WLAN Based on the 802.1X Protocol[J];It Age;2004-07
6 SUN Hong,YANG Yi-xian (Information Security Center,Beijing Univ.of Posts & Telecomm,Beijing 100876,China);On the Security of Wireless Network Protocol 802.11[J];Acta Electronica Sinica;2003-07
7 JIN Chen-hui,SUN Ying (Institute of Electronic Technology, the PIA University of Information Engineering, Zhengzhou, Henan 450004, China);Research on the Linear Redundancy in the AES S Box[J];Acta Electronica Sinica;2004-04
8 GENG Jia,CAO Xiu-ying,Bi Guang-guo (National mobile communication research laboratory ,Southeast University,Nanjing,Jiangsu 210096,China);A Method of Attacking WEP2 When IVs Are Generated from a Little-Endian Counter[J];Acta Electronica Sinica;2004-10
9 Peng Gen-peng Liu Chang-shu Li Zhi-hua (School of Electronic and Information Engineering, Tianjin University, Tianjin 300072, China);The Hybrid Pipelining Implementation of AES in the Feedback Mode Based on CPLD/FPGA[J];Journal of Electronics and Information Technology;2005-01
10 Chen Liquan 1, Hu Aiqun 1, Zhou Xueli 2(1. Radio Engineering Department, Southeast University, Nanjing 210096, China;2. Shandong College of Electronic Technology, Jinan 210096, China);Capacity of VoIP in IEEE 802.11 Wireless LAN[J];Engineering Science;2005-07
【Secondary References】
Chinese Journal Full-text Database 5 Hits
1 ZHANG Jing-wen(Dongguan Science and Technical School,Dongguan 523000,China);Campus Wireless Network Security Technical Analysis[J];Computer Knowledge and Technology;2010-12
2 WANG Zhang-sheng (Computer Center of Anhui Medical University,Hefei 230032,China);Research on Intrusion Detection for Wireless Ad hoc Network Based on AODV[J];Computer and Modernization;2010-09
3 LIU Yun-feng;Research on Application Security of Wireless Local Area Network(WLAN)[J];Sci-Tech Information Development & Economy;2009-28
4 KANG Yong-ping①, TAN Yun-lan②, TANG Peng-jie③ (①Centre of the Internet Management;②Information and Multimedia Science College, Jinggangshan University, Ji’an Jiangxi 343009,China; ③Computer Center, Nanchang University, Nanchang Jiangxi 330031, China);Simulation of Delay Packet Attack and Its Defense in WLAN[J];Communications Technology;2008-11
5 WU Qing-jia (Department of Information Science,Xinhua College,Sun Yat-Sen University,Guangzhou 510520);Discussion on WLAN Security Issues Survey in Network Teaching[J];Modern Computer;2011-08
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved