跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.84) 您好!臺灣時間:2024/12/04 11:35
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:劉嘉駿
研究生(外文):Chia-Chun Liu
論文名稱:在802.11網路上單鍵安全連線設定與用戶直接連通之實作
論文名稱(外文):Implementation of One-Button Security System and Direct Link Protocol on 802.11 Networks
指導教授:蘇賜麟
指導教授(外文):Szu-Lin Su
學位類別:碩士
校院名稱:國立成功大學
系所名稱:電機工程學系碩博士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2007
畢業學年度:95
語文別:中文
論文頁數:47
中文關鍵詞:傳輸速率無線網路安全無線網路
外文關鍵詞:802.11Throughput802.11eWLANSecurity
相關次數:
  • 被引用被引用:1
  • 點閱點閱:249
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
IEEE 802.11 無線區域網路(Wireless Local Area Networks, WLAN)是目前國內通訊領域最重要的一項產業,也在一般家庭中使用。不過,由於使用者的資料是透過無線傳遞的,會有安全上的疑慮。另外,同一個BSS(Basic Station Set)下的 STAs(Station)在交換資料時,通信量(Throughput)都遠低於 802.11g 所定義的最高速率 54Mbps,這是受限於 802.11 網路連線機制之設計。本論文針對這兩個議題加以討論並實現改善方法。
本論文即針對 IEEE 802.11 Infrastructure 模式,研究開發如何讓使用者方便設定安全連線的機制,另引入 802.11e DLP(Direct Link Protocol)機制以提高系統效能。研究構想為設計 OBSS(One Button Security System)機制,意即使用者在 STA 端按下 Button,系統會在短時間內自動建立兩端的安全連線,解決第三者(Third-Party)有意或無意間竊聽的可能性。此外我們亦討論在同一個 BSS下的兩台 STAs 互傳資料時頻譜浪費的問題,本論文利用 DLP 建立兩台 STA 間的溝通協定,使原本應該透過 AP 轉發的訊息變為 STAs 間直接對傳,其通信量可提高至原本的兩倍,進一步提升系統效能。
IEEE802.11 has served as a vital link in wireless local area communication
networks(WLAN)and it has also extended its usage to home applications. Such
popularity has led to lots of concern on its security and througput performance. This
thesis is devoted on the research of possible solutions for these two issues. As a result,
for the IEEE 802.11 infrastructure mode, this thesis proposes an One-Button Security
System(OBSS) which can automatically activate the secure tunnel between two
STAs in a short time after a simple button push in contrast to the complex process
required to be executed by the user before. To improve the system throughput, the
work of this thesis also includes the implementation of DLP(Direct Link Protocol)
process on a WLAN system.
中文摘要 i
Abstract ii
Contents iii
List of Tables iv
List of Figures v
第一章 前言 1
第二章 802.11系統介紹 3
2.1 IEEE 802.11 MAC介紹 3
2.1-1 Distributed Coordination Function(DCF)3
2.1-2 Point Coordination Function(PCF)5
2.2 IEEE 802.11e MAC介紹 6
2.2-1 Enhanced DCF 7
2.2-2 HCF Controlled Channel Access 9
2.2-3 Direct Link Protocol 11
第三章 相關工作與文獻探討 15
3.1 Buffalo AirStation One-Button Security System(OBSS) 15
3.2 BroadCom Secure Easy Setup(SES) 18
3.3 無線網路安全 18
3.3-1 802.11 安全機制 18
3.3-2 802.11 認證機制 18
3.3-3 獲得更高的安全性 21
第四章 One-Button Security System與Direct Link Protocol 23
4.1 One-Button Security System 23
4.1-1 One-Button Security System工作原理 23
4.2 Direct Link Protocol 29
4.2-1 Direct Link Protocol的工作原理 29
第五章 系統實作與測試 32
5.1 系統架構 32
5.2 軟體簡介 33
5.2-1 AP端的模組介紹 33
5.2-2 Client端的模組介紹 34
5.3 One-Button Security System Testing 36
5.4 Direct Link Protocol Testing 39
第六章 結論與建議 42
Bibliography 44
[1].IEEE, ”Wireless LAN Medium Access Medium Access Control(MAC) and Physical Layer (PHY) specifications.” IEEE Standard 802.11, June, 1999.
[2].IEEE “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 8: Medium Access Control (MAC) Quality of Service Enhancements” IEEE Standard 802.11e, November, 2005.
[3].Buffalo Technology, “AirStation One-Touch Secure System”, October, 2004.
[4].Humphrey Cheung, Tim Higgins, ‘“One-Touch" Wireless Security - Buffalo Technology's AOSS vs. Linksys' SecureEasySetup’ Avaliable:http://www.tomsnetworking.com/2005/06/21/one_touch/.
[5].WiFi Alliance, ‘Deploying Wi-Fi Protected Access (WPA™) and WPA2™ in the Enterprise’, March 2005. Avaliable: http://www.wifi.org.
[6].HP company, ‘The Linux Wireless LAN Howto’, Avaliable: http://www.hpl.hp.com/personal/Jean_Tourrilhes/Linux/.
[7].WildPackets company, ‘Converting Signal Strength Percentage to dBm Values’, Avaliable:http://www.wildpackets.com/elements/whitepapers/Converting_Signal_Strength.pdf, November 2002.
[8].O’REILLY, ‘Understanding Linux Network Internals’, December 2005.
[9].O’REILLY, ‘Understanding the Linux Kernel, Second Edition’, December 2005.
[10].O’REILLY, ‘802.11 Wireless Networks: The Definitive Guide, Second Edition’, April 2005.
[11].Jing Zhu, Xingang Guo, L. Lily Yang, and W. Steven Conner., “Leveraging Spatial Reuse in 802.11 Mesh Networks with Enhanced Physical Carrier Sensing”, 2004 IEEE International Conference on Wireless Communication, 20-24 June 2004 Page(s).
[12].Leung, K.K.; McNair, B.; Cimini, L.J., Jr.; Winters, J.H.; “Outdoor IEEE 802.11 Cellular Networks: MAC Protocol Design and Performance”, Communications, 2002. ICC 2002. IEEE International Conference on , Volume: 1 , 28 April-2 May 2002.
[13].T.S. Rappaport, “Wireless Communications: Principles & Practice”, Prentice Hall,Inc., Upper Saddle River, NJ, 1996, ISBN 0-13-375536-3.
[14].T.S. Rappaport, “RF Propagation and System Design Techniques for Broadband Wireless Applications form 5 to 40GHz,” 1998 Bellcore Horizons Workshop, available via http://www.mprg.ee.vt.edu.
[15].S.Y. Seidel, T.S. Rappaport, S. Jain , M. Lord, and R.Singh, “Path Loss, Scatering and Multipath Delay Statistics in Four European Cities for Digital Cellular and Microcellular Radiotelephone,”, IEEE Transactions on Vehicular Technology, Vol. 40, No. 4, pp. 721-730, November, 1991.
[16].Yang Xiao, Member, IEEE, and Jon Rosdahl, Senior Member, IEEE ”Throughput and Delay Limits of IEEE 802.11”, IEEE communication letter, VOL.6, NO.8, August 2002.
[17].Kuo, W.K.; Chan, C.Y.; Chen, K.C. , “Time bounded services and mobility management in IEEE 802.11 wireless LANs” , IEEE International Conference on Personal Wireless Communications, 1997 , 17-19 Dec. 1997.
[18].Haitao Wu; Shiduan Cheng; Yong Peng; Keping Long; Jian Ma, “IEEE 802.11 distributed coordination function (DCF): analysis and enhancement”, IEEE International Conference on Communications, 2002. ICC 2002. , Volume: 1 , 28 April-2 May 2002.
[19].楊士逸, 台灣思科系企業事業群技術支援部經理 “從加密技術看無線網路安全”, Avaliable: http://www.cisco.com/global/TW/networking/security/pdf/news2_1.pdf
[20].Wi-Fi Alliance, Wi-Fi Protected Access: Strong, Standards-Based, Interoperable Security for Today’s Wi-Fi Networks, Retrieved Mar. 1 2004.
[21].Joan Daemen and Vincent Rijmen, The Design of Rijndael: AES - The Advanced Encryption Standard, Springer-Verlag, 2002.
[22].Niels Ferguson, John Kelsey, Stefan Lucks, Bruce Schneier, Mike Stay, David Wagner, and Doug Whiting, Improved Cryptanalysis of Rijndael, Fast Software Encryption, 2000, pp213–230.
[23].Hung-Huang Liu and Jean-Jean-Lien C. Wu, “ Packet Telephony Support for the IEEE802.11 Wireless LAN”, IEEE Communication Letter, VOL. 4, NO.9 , September 2000.
[24].Wei Li; Qing-An Zeng; Agrawal, D.P., “A reliable active scanning scheme for the IEEE 802.11 MAC layer handoff”, Radio and Wireless Conference, 2003. RAWCON '03. Proceedings , Aug. 10-13, 2003
[25].H.-H. Liu, J.-L.C. Wu and W.-Y. Chen, “New frame-based network allocation vector for 802.11b multirate wireless LANs”, IEE Proc. Communn. , Wol.149, No. 3, June 2002.
[26].Joao L. Sobrinho, Member, IEEE and A.S. Krishnakumar, Member, IEEE, “ Quality of Service in Ad Hoc Carrier Sense Multiple Access Wireless Networks”, IEEE Journal on selected areas in communication, VOL.17, NO.8, august 1999.
[27].Kuo, W.K.; Chan, C.Y.; Chen, K.C. , “Time bounded services and mobility management in IEEE 802.11 wireless LANs” , International Conference on Personal Wireless Communications, 1997 IEEE , 17-19 Dec. 1997.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top