The Design of a Secure Protocol to Defend Man-In-Middel Attack in 802.1X
碩士 === 國立成功大學 === 電機工程學系碩博士班 === 92 === Because of the progressive wireless network technology and the large demand of wireless network service, the wireless security is gradually important in the recent years. In these few years, the wireless service has been provided in business fields and campu...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2004
|
Online Access: | http://ndltd.ncl.edu.tw/handle/52822829886575316659 |
id |
ndltd-TW-092NCKU5442096 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-092NCKU54420962016-06-17T04:16:57Z http://ndltd.ncl.edu.tw/handle/52822829886575316659 The Design of a Secure Protocol to Defend Man-In-Middel Attack in 802.1X 在無線網路上可抵擋中間人攻擊之金鑰交換安全協定 Jin-Neng Wu 吳金能 碩士 國立成功大學 電機工程學系碩博士班 92 Because of the progressive wireless network technology and the large demand of wireless network service, the wireless security is gradually important in the recent years. In these few years, the wireless service has been provided in business fields and campuses. Due to its convenient property, people like it very much. Even some computer manufactories have set up a wireless network card in notebook sets; people do not need to plunge a wireless network card any more and make user friendly. Although 802.1X works with many high-level authentications, it still has opportunity to be attacked because of its design default. To our based knowledge, we just find that the William A. Arbaugh makes an analysis of 802.1X and proposes their concept to stop the attacks which they find. They write some attacks in the technical paper published in University of Maryland. And this paper attracts much attention in the world. This thesis proposes a secure protocol in wireless LAN to protect the network from attacks. According to William A. Arbaugh’s method, we show that our proposed protocol is based on HMAC and signature. In addition, we explain how our proposed protocol can stop the two attacks and cannot stop the other two attacks. Finally, we make a conclusion about our protocol. Again, everyone has responsibility to protect himself/herself from sniffing and other attack in the wireless LAN or wired LAN. We can have good quality of this service if everyone really pays much attention to do it. 賴溪松 2004 學位論文 ; thesis 59 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立成功大學 === 電機工程學系碩博士班 === 92 === Because of the progressive wireless network technology and the large demand of wireless network service, the wireless security is gradually important in the recent years. In these few years, the wireless service has been provided in business fields and campuses. Due to its convenient property, people like it very much. Even some computer manufactories have set up a wireless network card in notebook sets; people do not need to plunge a wireless network card any more and make user friendly. Although 802.1X works with many high-level authentications, it still has opportunity to be attacked because of its design default.
To our based knowledge, we just find that the William A. Arbaugh makes an analysis of 802.1X and proposes their concept to stop the attacks which they find. They write some attacks in the technical paper published in University of Maryland. And this paper attracts much attention in the world.
This thesis proposes a secure protocol in wireless LAN to protect the network from attacks. According to William A. Arbaugh’s method, we show that our proposed protocol is based on HMAC and signature. In addition, we explain how our proposed protocol can stop the two attacks and cannot stop the other two attacks. Finally, we make a conclusion about our protocol. Again, everyone has responsibility to protect himself/herself from sniffing and other attack in the wireless LAN or wired LAN. We can have good quality of this service if everyone really pays much attention to do it.
|
author2 |
賴溪松 |
author_facet |
賴溪松 Jin-Neng Wu 吳金能 |
author |
Jin-Neng Wu 吳金能 |
spellingShingle |
Jin-Neng Wu 吳金能 The Design of a Secure Protocol to Defend Man-In-Middel Attack in 802.1X |
author_sort |
Jin-Neng Wu |
title |
The Design of a Secure Protocol to Defend Man-In-Middel Attack in 802.1X |
title_short |
The Design of a Secure Protocol to Defend Man-In-Middel Attack in 802.1X |
title_full |
The Design of a Secure Protocol to Defend Man-In-Middel Attack in 802.1X |
title_fullStr |
The Design of a Secure Protocol to Defend Man-In-Middel Attack in 802.1X |
title_full_unstemmed |
The Design of a Secure Protocol to Defend Man-In-Middel Attack in 802.1X |
title_sort |
design of a secure protocol to defend man-in-middel attack in 802.1x |
publishDate |
2004 |
url |
http://ndltd.ncl.edu.tw/handle/52822829886575316659 |
work_keys_str_mv |
AT jinnengwu thedesignofasecureprotocoltodefendmaninmiddelattackin8021x AT wújīnnéng thedesignofasecureprotocoltodefendmaninmiddelattackin8021x AT jinnengwu zàiwúxiànwǎnglùshàngkědǐdǎngzhōngjiānréngōngjīzhījīnyàojiāohuànānquánxiédìng AT wújīnnéng zàiwúxiànwǎnglùshàngkědǐdǎngzhōngjiānréngōngjīzhījīnyàojiāohuànānquánxiédìng AT jinnengwu designofasecureprotocoltodefendmaninmiddelattackin8021x AT wújīnnéng designofasecureprotocoltodefendmaninmiddelattackin8021x |
_version_ |
1718308564661960704 |