Based on VPN Tunnel Technology of Wireless Local Area Network

Article Preview

Abstract:

This paper analyzes the wireless local area network existing safety and efficiency problem. It put forward the VPN tunnel technology to solve these problems. Theory explains that it is very the advantages of layer second tunneling protocol in a wireless local area network. This technology is proved to be reliable by Network Simulate 2 tool. It is proved that the technique is the advantage of high efficiency and safety.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 546-547)

Pages:

1188-1193

Citation:

Online since:

July 2012

Keywords:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] S. Blake-Wilson, N. Bolyard V. Gupta, C. Hawk, B. Moeller, Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS). RFC4492, May (2006).

DOI: 10.17487/rfc4492

Google Scholar

[2] Fluhrer, S, Martion, I and Shamir,A., Weaknesses in the key scheduling algorithm of RC4, Eighth Annual Workshop on Selected Areas in Cryptography, August (2001).

DOI: 10.1007/3-540-45537-x_1

Google Scholar

[3] Borisov,N., Goldberg,I., and Wagner,D., Intercepting mobile communications; The insecurity of 802. 11, In Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking, (2001).

DOI: 10.1145/381677.381695

Google Scholar

[4] Liu Ke, Xu Changbiao, Yang Shizhong Authentication Mechanisms in WLAN. Compuer Technology and Development, Jun 2008, pp.164-167.

Google Scholar

[5] A. Valencia, M. Littlewood, T. Kolar et al. Cisco Layer Two Forwarding (Protocol) L2F,. RFC2341,May (1998).

DOI: 10.17487/rfc2341

Google Scholar

[6] K. Hamzeh,G. Pall,W. Verthein et al. Point-to-Point Tunneling Protocol. RFC2637, July (1999).

DOI: 10.17487/rfc2637

Google Scholar

[7] W. Townsley, A. Valencia, A. Rubens, G. Pall, G. Zorn, B. Palter, Layer Two Tunneling Protocol L2TP, RFC 2661, August (1999).

DOI: 10.17487/rfc2661

Google Scholar

[8] D. Piper, The Internet IP Security Domain of Interpretation for ISAKMP, RFC 2407, November (1998).

DOI: 10.17487/rfc2407

Google Scholar

[9] E. Rosen,A. Viswanathan,R. Callon. Multiprotocol Label Switching Architecture. RFC3031, January (2001).

DOI: 10.17487/rfc3031

Google Scholar

[10] Nian Yi, Based on IPSec wireless local area network security technology research, Master Dissertation of Jiangsu University, October (2005).

Google Scholar

[11] Fang Luping, Liu Shihua, Chen pan. NS-2 network simulation and application [B], National Defense Industry Press, Beijing, (2008).

Google Scholar

[12] http: /phi. sinica. edu. tw/aspac/reports/94/94011.

Google Scholar

[13] Liu Fangmin. The results of NS2 network simulation output and analysis. . Computer Engineering, 26 (9), 2002,: p.14 – 16.

Google Scholar