首页 | 本学科首页   官方微博 | 高级检索  
     检索      

Security Mechanisms of Wired Equivalent Privacy and Wi-Fi Protected Access in WLAN: Review and Analysis
引用本文:张显石,康戈文,王新珩.Security Mechanisms of Wired Equivalent Privacy and Wi-Fi Protected Access in WLAN: Review and Analysis[J].西南交通大学学报(英文版),2009,17(1):16-21.
作者姓名:张显石  康戈文  王新珩
作者单位:ZHANG Xian-shi,KANG Ge-wen(College of Automation,University of Electronic Science and Technology of China,Chengdu 610031,China);WANG Xin-heng(2.Institute of Advanced Telecommunications,University of Wales Swansea,Swansea,UK) 
摘    要:

关 键 词:WLAN  安全性  WEP  WPA  密匙完整性协议

Security Mechanisms of Wired Equivalent Privacy and Wi-Fi Protected Access in WLAN: Review and Analysis
ZHANG Xian-shi,KANG Ge-wen,WANG Xin-heng.Security Mechanisms of Wired Equivalent Privacy and Wi-Fi Protected Access in WLAN: Review and Analysis[J].Journal of Southwest Jiaotong University,2009,17(1):16-21.
Authors:ZHANG Xian-shi  KANG Ge-wen  WANG Xin-heng
Institution:1. College of Automation,University of Electronic Science and Technology of China,Chengdu 610031,China
2. 2.Institute of Advanced Telecommunications,University of Wales Swansea,Swansea,UK
Abstract:An analysis of WLAN security mechanisms of wired equivalent privacy (WEP) and Wi-Fi protected access (WPA) discovers that the current literature is not totally creditable in its judgment on the security value of WEP and WPA.Based on the respective performances of WEP and WPA under certain typical attacks,this paper substantiates the judgment that WEP has quite a few vulnerabilities concerning confidentiality and integrity,but at the same time challenges the judgment on WPA with that WPA is robust enough to confront potential typical attacks and is not so unreliable as the current literature believes,although it has some vulnerabilities in its message integrity code (MIC).
Keywords:WLAN security  WEP  WPA  Temporal key integrity protocol (TKIP)
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号