LAN Security Strategy Based on AES

Article Preview

Abstract:

This paper mainly analyzed the security of AES(Advanced Encryption Standard) protocol and virtual private network technology ,the network 802.3 and 802.1x/EXP security vulnerabilities: defects of Service Set Identifier and MAC Address Filtering, defects of User Authentication Method, security vulnerabilities of WPA Algorithm, defects of 802.1x / EAP and RADIUS Authentication, etc. The authentication and encryption method to improve network security measures.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 989-994)

Pages:

4245-4248

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Xiuying Cao etc. Security System of network, Electronic Industry Press, (2009).

Google Scholar

[2] Xiaodong Zuo. Analysis of network, Telecommunications Science, (2010).

Google Scholar

[3] Yinchun Yang. Analysis of WAPI security mechanism [J], Computer Engineering, (2011).

Google Scholar

[4] (English) Edney, (American) Al Pau writes, Zheng Zhou, etc. Security Practice of network -WPA and 802. 3i, People's Posts and Telecommunications Publishing House, (2010).

Google Scholar

[5] Haiying Gao, Yuanxing Xue, etc. virtual private network Technologies, China Machine Press, (2012).

Google Scholar

[6] Yurzin Bogdanov, Valeri Chipulis.  Information-analytical systems of thermo-power engineering[A]. Proceedings of The First International Conference on Wireless Communications and Applications[C]. (2011).

Google Scholar