A Fingerprint Based Authenticationfor WLAN in Enterprise

碩士 === 東吳大學 === 資訊科學系 === 96 === The rapid growth of Wireless Network has made the enterprises start to think ways to closely combine the exiting internet environment and WLAN. As enterprises build Wireless Network, the most critical concern is the security of wireless environment.According to some...

Full description

Bibliographic Details
Main Authors: Hsin-Liang Chan, 詹信良
Other Authors: Yung-Chen Hung
Format: Others
Language:zh-TW
Published: 2008
Online Access:http://ndltd.ncl.edu.tw/handle/55641076501884017806
id ndltd-TW-096SCU05394002
record_format oai_dc
spelling ndltd-TW-096SCU053940022015-10-13T11:31:57Z http://ndltd.ncl.edu.tw/handle/55641076501884017806 A Fingerprint Based Authenticationfor WLAN in Enterprise 指紋辨識應用於企業之無線區域網路上 Hsin-Liang Chan 詹信良 碩士 東吳大學 資訊科學系 96 The rapid growth of Wireless Network has made the enterprises start to think ways to closely combine the exiting internet environment and WLAN. As enterprises build Wireless Network, the most critical concern is the security of wireless environment.According to some studies, there have been some findings of disadvantages of frequently usages of WEP [17]。Hackers could easily capture the packets and break WEP Key [18] by some tools such as Aircrack, Airopeek …etc. Therefore, this study is using the characteristics of exclusiveness, low cost and small storage (300Bytes) and high security from fingerprints [19], to propose a biometric characteristics technique to achieve the identification authentication on wireless internet for the enterprises. In the meantime, analyze the attaching tactics, threatening of all wireless internet and the strategies of protections. The propositions are as follows in brief: (1) To provide a more secure wireless internet environment rather than traditional WEP and as well improve the problems of IEEE 802.11b wireless internet authentication nowadays [25]. (2) To propose a capable, low costs, high security and easy to use fingerprints system. Use of the exclusiveness and encryption/decryption of the fingerprint template, hence to achieve identification and Non-Repudiation. Meantime, in order to invent the interface of users and apply to personal authentication. (3) To use the fingerprints template of users and retrieve system timing (year, month, day, hour, minute, second, milli second). The combination of two will be transformed into the Session Key of encryption/decryption thorough hash algorithm SHA256 (exclusiveness guaranteed without repeating). Hence to achieve the confidentialness of data transferring by the use of Session Key and AES calculation with encryption/decryption on the data. The conclusion of this study will help the enterprises a further step on the filed of WLAN Security Identification. Keywords: WLAN;WEP;AES;IEEE 802.11b;Session Key;SHA256。 Yung-Chen Hung 洪永城 2008 學位論文 ; thesis 62 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 東吳大學 === 資訊科學系 === 96 === The rapid growth of Wireless Network has made the enterprises start to think ways to closely combine the exiting internet environment and WLAN. As enterprises build Wireless Network, the most critical concern is the security of wireless environment.According to some studies, there have been some findings of disadvantages of frequently usages of WEP [17]。Hackers could easily capture the packets and break WEP Key [18] by some tools such as Aircrack, Airopeek …etc. Therefore, this study is using the characteristics of exclusiveness, low cost and small storage (300Bytes) and high security from fingerprints [19], to propose a biometric characteristics technique to achieve the identification authentication on wireless internet for the enterprises. In the meantime, analyze the attaching tactics, threatening of all wireless internet and the strategies of protections. The propositions are as follows in brief: (1) To provide a more secure wireless internet environment rather than traditional WEP and as well improve the problems of IEEE 802.11b wireless internet authentication nowadays [25]. (2) To propose a capable, low costs, high security and easy to use fingerprints system. Use of the exclusiveness and encryption/decryption of the fingerprint template, hence to achieve identification and Non-Repudiation. Meantime, in order to invent the interface of users and apply to personal authentication. (3) To use the fingerprints template of users and retrieve system timing (year, month, day, hour, minute, second, milli second). The combination of two will be transformed into the Session Key of encryption/decryption thorough hash algorithm SHA256 (exclusiveness guaranteed without repeating). Hence to achieve the confidentialness of data transferring by the use of Session Key and AES calculation with encryption/decryption on the data. The conclusion of this study will help the enterprises a further step on the filed of WLAN Security Identification. Keywords: WLAN;WEP;AES;IEEE 802.11b;Session Key;SHA256。
author2 Yung-Chen Hung
author_facet Yung-Chen Hung
Hsin-Liang Chan
詹信良
author Hsin-Liang Chan
詹信良
spellingShingle Hsin-Liang Chan
詹信良
A Fingerprint Based Authenticationfor WLAN in Enterprise
author_sort Hsin-Liang Chan
title A Fingerprint Based Authenticationfor WLAN in Enterprise
title_short A Fingerprint Based Authenticationfor WLAN in Enterprise
title_full A Fingerprint Based Authenticationfor WLAN in Enterprise
title_fullStr A Fingerprint Based Authenticationfor WLAN in Enterprise
title_full_unstemmed A Fingerprint Based Authenticationfor WLAN in Enterprise
title_sort fingerprint based authenticationfor wlan in enterprise
publishDate 2008
url http://ndltd.ncl.edu.tw/handle/55641076501884017806
work_keys_str_mv AT hsinliangchan afingerprintbasedauthenticationforwlaninenterprise
AT zhānxìnliáng afingerprintbasedauthenticationforwlaninenterprise
AT hsinliangchan zhǐwénbiànshíyīngyòngyúqǐyèzhīwúxiànqūyùwǎnglùshàng
AT zhānxìnliáng zhǐwénbiànshíyīngyòngyúqǐyèzhīwúxiànqūyùwǎnglùshàng
AT hsinliangchan fingerprintbasedauthenticationforwlaninenterprise
AT zhānxìnliáng fingerprintbasedauthenticationforwlaninenterprise
_version_ 1716846298067369984