The Design of a Secure Protocol to Defend Man-In-Middel Attack in 802.1X

碩士 === 國立成功大學 === 電機工程學系碩博士班 === 92 ===   Because of the progressive wireless network technology and the large demand of wireless network service, the wireless security is gradually important in the recent years. In these few years, the wireless service has been provided in business fields and campu...

Full description

Bibliographic Details
Main Authors: Jin-Neng Wu, 吳金能
Other Authors: 賴溪松
Format: Others
Language:en_US
Published: 2004
Online Access:http://ndltd.ncl.edu.tw/handle/52822829886575316659
id ndltd-TW-092NCKU5442096
record_format oai_dc
spelling ndltd-TW-092NCKU54420962016-06-17T04:16:57Z http://ndltd.ncl.edu.tw/handle/52822829886575316659 The Design of a Secure Protocol to Defend Man-In-Middel Attack in 802.1X 在無線網路上可抵擋中間人攻擊之金鑰交換安全協定 Jin-Neng Wu 吳金能 碩士 國立成功大學 電機工程學系碩博士班 92   Because of the progressive wireless network technology and the large demand of wireless network service, the wireless security is gradually important in the recent years. In these few years, the wireless service has been provided in business fields and campuses. Due to its convenient property, people like it very much. Even some computer manufactories have set up a wireless network card in notebook sets; people do not need to plunge a wireless network card any more and make user friendly. Although 802.1X works with many high-level authentications, it still has opportunity to be attacked because of its design default.   To our based knowledge, we just find that the William A. Arbaugh makes an analysis of 802.1X and proposes their concept to stop the attacks which they find. They write some attacks in the technical paper published in University of Maryland. And this paper attracts much attention in the world.   This thesis proposes a secure protocol in wireless LAN to protect the network from attacks. According to William A. Arbaugh’s method, we show that our proposed protocol is based on HMAC and signature. In addition, we explain how our proposed protocol can stop the two attacks and cannot stop the other two attacks. Finally, we make a conclusion about our protocol. Again, everyone has responsibility to protect himself/herself from sniffing and other attack in the wireless LAN or wired LAN. We can have good quality of this service if everyone really pays much attention to do it. 賴溪松 2004 學位論文 ; thesis 59 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立成功大學 === 電機工程學系碩博士班 === 92 ===   Because of the progressive wireless network technology and the large demand of wireless network service, the wireless security is gradually important in the recent years. In these few years, the wireless service has been provided in business fields and campuses. Due to its convenient property, people like it very much. Even some computer manufactories have set up a wireless network card in notebook sets; people do not need to plunge a wireless network card any more and make user friendly. Although 802.1X works with many high-level authentications, it still has opportunity to be attacked because of its design default.   To our based knowledge, we just find that the William A. Arbaugh makes an analysis of 802.1X and proposes their concept to stop the attacks which they find. They write some attacks in the technical paper published in University of Maryland. And this paper attracts much attention in the world.   This thesis proposes a secure protocol in wireless LAN to protect the network from attacks. According to William A. Arbaugh’s method, we show that our proposed protocol is based on HMAC and signature. In addition, we explain how our proposed protocol can stop the two attacks and cannot stop the other two attacks. Finally, we make a conclusion about our protocol. Again, everyone has responsibility to protect himself/herself from sniffing and other attack in the wireless LAN or wired LAN. We can have good quality of this service if everyone really pays much attention to do it.
author2 賴溪松
author_facet 賴溪松
Jin-Neng Wu
吳金能
author Jin-Neng Wu
吳金能
spellingShingle Jin-Neng Wu
吳金能
The Design of a Secure Protocol to Defend Man-In-Middel Attack in 802.1X
author_sort Jin-Neng Wu
title The Design of a Secure Protocol to Defend Man-In-Middel Attack in 802.1X
title_short The Design of a Secure Protocol to Defend Man-In-Middel Attack in 802.1X
title_full The Design of a Secure Protocol to Defend Man-In-Middel Attack in 802.1X
title_fullStr The Design of a Secure Protocol to Defend Man-In-Middel Attack in 802.1X
title_full_unstemmed The Design of a Secure Protocol to Defend Man-In-Middel Attack in 802.1X
title_sort design of a secure protocol to defend man-in-middel attack in 802.1x
publishDate 2004
url http://ndltd.ncl.edu.tw/handle/52822829886575316659
work_keys_str_mv AT jinnengwu thedesignofasecureprotocoltodefendmaninmiddelattackin8021x
AT wújīnnéng thedesignofasecureprotocoltodefendmaninmiddelattackin8021x
AT jinnengwu zàiwúxiànwǎnglùshàngkědǐdǎngzhōngjiānréngōngjīzhījīnyàojiāohuànānquánxiédìng
AT wújīnnéng zàiwúxiànwǎnglùshàngkědǐdǎngzhōngjiānréngōngjīzhījīnyàojiāohuànānquánxiédìng
AT jinnengwu designofasecureprotocoltodefendmaninmiddelattackin8021x
AT wújīnnéng designofasecureprotocoltodefendmaninmiddelattackin8021x
_version_ 1718308564661960704