Study of authentication mechanism in wireless local area network
碩士 === 靜宜大學 === 資訊管理學系研究所 === 92 === Because of the transmitting characteristics of airwaves, the safety of wireless networks brings more threat than wired networks do. Among all the essential security, such as authentication, privacy and not-repudiation, authentication is considered the most impor...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2003
|
Online Access: | http://ndltd.ncl.edu.tw/handle/89505594331923253329 |
id |
ndltd-TW-092PU005396005 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-092PU0053960052016-06-08T04:13:34Z http://ndltd.ncl.edu.tw/handle/89505594331923253329 Study of authentication mechanism in wireless local area network 無線區域網路認證機制之研究 Shy-Yi Chen 陳錫沂 碩士 靜宜大學 資訊管理學系研究所 92 Because of the transmitting characteristics of airwaves, the safety of wireless networks brings more threat than wired networks do. Among all the essential security, such as authentication, privacy and not-repudiation, authentication is considered the most important. In this paper, we study the existing authentication mechanisms in wireless local area networks (WLAN). And propose a cost-effective WLAN Mutual Authentication Mechanism. Our mechanism adopt the remote password authentication system as the framework and use Shamir’s “Identity-Based Signature Scheme”, Schnorr’s “Identification Scheme” and Deffie Hellman’s “Key Exchange Scheme”, to achieve the mutual authentication between users and AP. The system not only reduces the usage of RADIUS server in IEEE 802.1X, but also provides a solution to “man in the middle attack.” In addition, time stamps is used for preventing replay attack. Phen-Lan Lin 林芬蘭 2003 學位論文 ; thesis 58 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 靜宜大學 === 資訊管理學系研究所 === 92 === Because of the transmitting characteristics of airwaves, the safety of wireless networks brings more threat than wired networks do. Among all the essential security, such as authentication, privacy and not-repudiation, authentication is considered the most important. In this paper, we study the existing authentication mechanisms in wireless local area networks (WLAN). And propose a cost-effective WLAN Mutual Authentication Mechanism. Our mechanism adopt the remote password authentication system as the framework and use Shamir’s “Identity-Based Signature Scheme”, Schnorr’s “Identification Scheme” and Deffie Hellman’s “Key Exchange Scheme”, to achieve the mutual authentication between users and AP. The system not only reduces the usage of RADIUS server in IEEE 802.1X, but also provides a solution to “man in the middle attack.” In addition, time stamps is used for preventing replay attack.
|
author2 |
Phen-Lan Lin |
author_facet |
Phen-Lan Lin Shy-Yi Chen 陳錫沂 |
author |
Shy-Yi Chen 陳錫沂 |
spellingShingle |
Shy-Yi Chen 陳錫沂 Study of authentication mechanism in wireless local area network |
author_sort |
Shy-Yi Chen |
title |
Study of authentication mechanism in wireless local area network |
title_short |
Study of authentication mechanism in wireless local area network |
title_full |
Study of authentication mechanism in wireless local area network |
title_fullStr |
Study of authentication mechanism in wireless local area network |
title_full_unstemmed |
Study of authentication mechanism in wireless local area network |
title_sort |
study of authentication mechanism in wireless local area network |
publishDate |
2003 |
url |
http://ndltd.ncl.edu.tw/handle/89505594331923253329 |
work_keys_str_mv |
AT shyyichen studyofauthenticationmechanisminwirelesslocalareanetwork AT chénxīyí studyofauthenticationmechanisminwirelesslocalareanetwork AT shyyichen wúxiànqūyùwǎnglùrènzhèngjīzhìzhīyánjiū AT chénxīyí wúxiànqūyùwǎnglùrènzhèngjīzhìzhīyánjiū |
_version_ |
1718297381462605824 |