The Security Analysis of WLAN Protocol Based on 802.11i

Article Preview

Abstract:

This article briefly describes the weaknesses of WEP,which is previous generation wireless LAN security standard, then introduces the new generation of wireless network security standard 802.11i. Then the article introduces the process of TKIP and CCMP encryption. We use experiments to compare TKIP with CCMP about protocol security. Ultimately we conclude that CCMP encryption is safer.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

628-631

Citation:

Online since:

February 2014

Keywords:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Liu Qi, He Lianyue, Yang Canqun. Information Security Assurance of WLAN. Computer Applications. 2003, 23 (4): 92-95.

Google Scholar

[2] Yu Miao, Li Shiju. The analysis and simulation of CCMP protocol in IEEE 802. 11i standard. Radio and Communications Technology. 2005, 31(4): 51-54.

Google Scholar

[3] Chen Zhuo, Wang Ruimin. Analyze security of MIC- Michael in TKIP. Computer Engineering and Design. 2006, 27(7): 1149-1151.

Google Scholar

[4] Shen Dunhou, Peng Jiangyu, Hu Bo, Gong Fagen. The Analysis of Wireless Network Security Standard IEEE802. 11i. Computing Technology and Automation. 2004, 23(4): 106-108.

Google Scholar

[5] Song Yubo, Huang Yuhuai. Concrete provable security analysis ofCCMP protocol. Journal of Southeast University. 2008, 38(2): 206-210.

Google Scholar

[6] Gong Kai, Yu Rong. Attack and Defense Strategy Based on Flaw of WPA. Command Information System and Technology. 2013, 4(1): 61-65.

Google Scholar