当前位置:主页 > 科技论文 > 网络通信论文 >

通过NFC认证的WLAN接入协议的安全性分析与实现

发布时间:2018-03-04 08:07

  本文选题:无线局域网 切入点:近场通信 出处:《天津大学》2014年硕士论文 论文类型:学位论文


【摘要】:当前针对无线局域网进行的非法接入攻击与窃听攻击十分严重,造成了非常严重的安全问题。为了解决目前无线局域网容易遭受攻击者发起的非法接入攻击和窃听攻击的问题,本文使用了近场通信技术对无线局域网的安全弱点进行加强,并采用了着色Petri网对无线局域网与近场通信进行了建模。通过解决在模型中暴露的问题,本文设计出了“通过NFC认证的WLAN接入协议”,并针对该协议的非法接入攻击与窃听攻击进行了着色Petri网建模。“通过NFC认证的WLAN接入协议”采用Diffie-Hellman密钥交换算法与第二代安全散列算法生成基于近场通信协议栈的安全隧道。防范非法接入方面采用公开密码体制下的椭圆曲线数字签名算法对接入者身份进行认证。防范窃听方面采用随机生成的预共享密钥来配置无线局域网接入点保证用户接入的一次一密性。着色Petri网模型的仿真验证表明,通过NFC认证的WLAN接入协议对于无线局域网的非法接入攻击与窃听攻击有着良好的抵抗效果。并且协议本身也可以抵抗针对近场通信的窃听攻击、数据篡改攻击、重放攻击和中间人攻击。本文针对设计出的协议进行了协议需求分析与架构设计,并给出了一个计算机上的原型实现。原型实现的运行效果表明通过NFC认证的WLAN接入协议能够足够稳健的运行并有着良好的应用前景,可以解决当前针对无线局域网的非法接入攻击与窃听攻击。
[Abstract]:At present, the illegal access attack and eavesdropping attack against WLAN are very serious, which has caused very serious security problems. In order to solve the problem that WLAN is vulnerable to illegal access attack and eavesdropping attack launched by attacker, In this paper, we use near field communication technology to strengthen the security weakness of WLAN, and use colored Petri net to model WLAN and near field communication. In this paper, "WLAN access protocol authenticated by NFC" is designed, and the model of colored Petri net for illegal access attack and eavesdropping attack of this protocol is presented. Diffie-Hellman key exchange algorithm and Diffie-Hellman key exchange algorithm are used in WLAN access Protocol authenticated by NFC. The second generation secure hash algorithm is used to generate secure tunnel based on near field communication protocol stack. In the aspect of preventing illegal access, the elliptic curve digital signature algorithm based on public cryptosystem is used to authenticate the identity of the accessor and to guard against eavesdropping. A random preshared key is used to configure the WLAN access point to ensure the one-time density of the user access. The simulation results of the colored Petri net model show that, The WLAN access protocol authenticated by NFC has good resistance to illegal access attack and eavesdropping attack of WLAN, and the protocol itself can resist eavesdropping attack and data tampering attack against near field communication. Replay attack and man-in-the-middle attack. A prototype implementation on a computer is given. The result of the prototype implementation shows that the WLAN access protocol authenticated by NFC can run stably enough and has a good application prospect. It can solve the current illegal access attacks and eavesdropping attacks against WLAN.
【学位授予单位】:天津大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TN925.93

【参考文献】

相关期刊论文 前4条

1 刘安;金志刚;王颖;;MACH:针对WLAN中WPS认证高速攻击方案[J];计算机应用研究;2014年08期

2 刘永磊;金志刚;;无线局域网WPS安全性分析[J];计算机工程与应用;2013年21期

3 马捷;鄂金龙;;基于近场通信的WiFi传输连接方案[J];计算机工程;2013年06期

4 周超;周城;郭亮;;IEEE 802.1X的安全性分析及改进[J];计算机应用;2011年05期



本文编号:1564812

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/wltx/1564812.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户01927***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com