English  |  正體中文  |  简体中文  |  Items with full text/Total items : 55176/89442 (62%)
Visitors : 10657613      Online Users : 31
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/35139

    Title: The study of key management scheme for IEEE 802.11
    Other Titles: IEEE 802.11 密鑰管理技術之研究
    Authors: 陳韻如;Chen, Yun-ru
    Contributors: 淡江大學資訊工程學系碩士班
    黃仁俊;Hwang, Ren-junn
    Keywords: 網路安全;無線網路安全;密鑰管理;WEP;network security;wireless network security;key management;WEP
    Date: 2006
    Issue Date: 2010-01-11 06:03:54 (UTC+8)
    Abstract: 在無線網路中,由於訊號是藉由無線電訊號來傳送,所以無線網路最顯著的問題就是訊號易被竊聽。目前一般無線網路安全是採用IEEE 802.11標準中的有線等效保密協定(wired equivalent privacy protocol,簡稱WEP)以保護訊息的私密性。但是許多研究已指出WEP存在許多安全問題,並且無法滿足無線網路的三個基本安全需求:私密性、使用者鑑別性與資料完整性。另外,由於WEP協定使用固定的四把WEP密鑰,且無密鑰管理協定來負責密鑰的更新,因此當使用期限已屆時,先前已授權的用戶將無法完全地被撤銷。
    在2005年,Wool提出WEP*與WEP**方法以改善使用者撤銷之問題,然而WEP*仍存在部份安全弱點且不夠便利;雖然WEP**改善WEP*的安全性,但是卻不相容於IEEE 802.11無線網路標準。在本篇論文中,我們提出一個適用於IEEE 802.11無線網路標準的密鑰管理協定,此協定除了增進WEP協定的私密性外,亦改善WEP協定所遭遇的其他安全問題,而且存取點 (Access Point,簡稱AP) 和使用者能夠相互驗證彼此的身份。除非使用者使用期限已至,否則AP和使用者的連線並不會中斷,然而,Wool的方法必須花費額外的驗證步驟與時間才能夠繼續保持連線。更進一步地,我們的方法能與IEEE 802.11 standard相容,且不像其他解決方案,我們的方法不需要仰賴額外的鑑別伺服器,因此,我們的方法更適用於基本的IEEE 802.11架構,像是部署於家庭或是辦公室的無線區域網路。
    In wireless network environment, the message was sent by radio frequency, so the most notable problem is that messages will be eavesdropped arbitrarily. In order to protect confidentiality, the general wireless network adopts a wired equivalent privacy (WEP) protocol in IEEE 802.11 standard at present. But there are many researches point out that WEP involved a lot of security problems and doesn’t satisfy three main security requirements: confidentiality, authentication and data integrity. Besides, WEP uses four static WEP keys without key management to refresh keys, so the previously authorized hosts can not revoked fully when their service time is over deadline.
    In 2005, Wool proposed WEP* and WEP** scheme that have solved the user revocation problem, but WEP* still has some security weaknesses and its convenience is not good enough for users; although WEP** improves the security problems of WEP*, WEP** is not compatible with IEEE 802.11 standard. In this article, we proposed a new key management scheme that is suitable for IEEE 802.11 standard. The proposed scheme not only enhances confidentiality, but also improves the other security problems of WEP*. The access point (AP) and host authenticate each other in the proposed scheme. The connection of the AP and host do not interrupt in the proposed scheme except the deadline of connection service expire, while the Wool’s WEP* has to take more extra authentication steps and time to continues the connection by security consideration. Furthermore, our scheme is compatible with IEEE 802.11 standard, and unlike above solutions, our scheme doesn’t need an extra authentication server. Therefore, our scheme is suitable for basic IEEE 802.11 infrastructure such as wireless local area network deployed in houses or small offices.
    Appears in Collections:[Graduate Institute & Department of Computer Science and Information Engineering] Thesis

    Files in This Item:

    File SizeFormat

    All items in 機構典藏 are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback