通過NFC認(rèn)證的WLAN接入?yún)f(xié)議的安全性分析與實(shí)現(xiàn)
發(fā)布時(shí)間:2018-03-04 08:07
本文選題:無線局域網(wǎng) 切入點(diǎn):近場(chǎng)通信 出處:《天津大學(xué)》2014年碩士論文 論文類型:學(xué)位論文
【摘要】:當(dāng)前針對(duì)無線局域網(wǎng)進(jìn)行的非法接入攻擊與竊聽攻擊十分嚴(yán)重,造成了非常嚴(yán)重的安全問題。為了解決目前無線局域網(wǎng)容易遭受攻擊者發(fā)起的非法接入攻擊和竊聽攻擊的問題,本文使用了近場(chǎng)通信技術(shù)對(duì)無線局域網(wǎng)的安全弱點(diǎn)進(jìn)行加強(qiáng),并采用了著色Petri網(wǎng)對(duì)無線局域網(wǎng)與近場(chǎng)通信進(jìn)行了建模。通過解決在模型中暴露的問題,本文設(shè)計(jì)出了“通過NFC認(rèn)證的WLAN接入?yún)f(xié)議”,并針對(duì)該協(xié)議的非法接入攻擊與竊聽攻擊進(jìn)行了著色Petri網(wǎng)建模!巴ㄟ^NFC認(rèn)證的WLAN接入?yún)f(xié)議”采用Diffie-Hellman密鑰交換算法與第二代安全散列算法生成基于近場(chǎng)通信協(xié)議棧的安全隧道。防范非法接入方面采用公開密碼體制下的橢圓曲線數(shù)字簽名算法對(duì)接入者身份進(jìn)行認(rèn)證。防范竊聽方面采用隨機(jī)生成的預(yù)共享密鑰來配置無線局域網(wǎng)接入點(diǎn)保證用戶接入的一次一密性。著色Petri網(wǎng)模型的仿真驗(yàn)證表明,通過NFC認(rèn)證的WLAN接入?yún)f(xié)議對(duì)于無線局域網(wǎng)的非法接入攻擊與竊聽攻擊有著良好的抵抗效果。并且協(xié)議本身也可以抵抗針對(duì)近場(chǎng)通信的竊聽攻擊、數(shù)據(jù)篡改攻擊、重放攻擊和中間人攻擊。本文針對(duì)設(shè)計(jì)出的協(xié)議進(jìn)行了協(xié)議需求分析與架構(gòu)設(shè)計(jì),并給出了一個(gè)計(jì)算機(jī)上的原型實(shí)現(xiàn)。原型實(shí)現(xiàn)的運(yùn)行效果表明通過NFC認(rèn)證的WLAN接入?yún)f(xié)議能夠足夠穩(wěn)健的運(yùn)行并有著良好的應(yīng)用前景,可以解決當(dāng)前針對(duì)無線局域網(wǎng)的非法接入攻擊與竊聽攻擊。
[Abstract]:At present, the illegal access attack and eavesdropping attack against WLAN are very serious, which has caused very serious security problems. In order to solve the problem that WLAN is vulnerable to illegal access attack and eavesdropping attack launched by attacker, In this paper, we use near field communication technology to strengthen the security weakness of WLAN, and use colored Petri net to model WLAN and near field communication. In this paper, "WLAN access protocol authenticated by NFC" is designed, and the model of colored Petri net for illegal access attack and eavesdropping attack of this protocol is presented. Diffie-Hellman key exchange algorithm and Diffie-Hellman key exchange algorithm are used in WLAN access Protocol authenticated by NFC. The second generation secure hash algorithm is used to generate secure tunnel based on near field communication protocol stack. In the aspect of preventing illegal access, the elliptic curve digital signature algorithm based on public cryptosystem is used to authenticate the identity of the accessor and to guard against eavesdropping. A random preshared key is used to configure the WLAN access point to ensure the one-time density of the user access. The simulation results of the colored Petri net model show that, The WLAN access protocol authenticated by NFC has good resistance to illegal access attack and eavesdropping attack of WLAN, and the protocol itself can resist eavesdropping attack and data tampering attack against near field communication. Replay attack and man-in-the-middle attack. A prototype implementation on a computer is given. The result of the prototype implementation shows that the WLAN access protocol authenticated by NFC can run stably enough and has a good application prospect. It can solve the current illegal access attacks and eavesdropping attacks against WLAN.
【學(xué)位授予單位】:天津大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TN925.93
【參考文獻(xiàn)】
相關(guān)期刊論文 前4條
1 劉安;金志剛;王穎;;MACH:針對(duì)WLAN中WPS認(rèn)證高速攻擊方案[J];計(jì)算機(jī)應(yīng)用研究;2014年08期
2 劉永磊;金志剛;;無線局域網(wǎng)WPS安全性分析[J];計(jì)算機(jī)工程與應(yīng)用;2013年21期
3 馬捷;鄂金龍;;基于近場(chǎng)通信的WiFi傳輸連接方案[J];計(jì)算機(jī)工程;2013年06期
4 周超;周城;郭亮;;IEEE 802.1X的安全性分析及改進(jìn)[J];計(jì)算機(jī)應(yīng)用;2011年05期
,本文編號(hào):1564812
本文鏈接:http://sikaile.net/kejilunwen/wltx/1564812.html
最近更新
教材專著