Font Size: a A A

Simulation Of Security Authentication In WLAN

Posted on:2011-02-22Degree:MasterType:Thesis
Country:ChinaCandidate:J F ZhangFull Text:PDF
GTID:2178330332488251Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Since the Application of WLAN is becoming increasingly commonplace, the security problem is more concerned by consumers and researchers. IEEE802.11i criterion adopted the IEEE802.11i criterion in EAP (Extensible Authentication Protocol) as an improtant method for WLAN Security. Stimulation method is an improtant means of study on the impact of EPA on network performance.This paper studies the IEEE802.1x Protocol, and tests the effect of authentication procedures on networks performance in wireless network by the simulation results through the method of adding node model with authentication to the OPENT simulation software. The paper first introduces the features and the development of Wireless network, succeeded by introducing the relative standard of wireless network technology,present situation of security and the relative technology. Then presents emphatically the widely used IEEE802.1 x standard and EAP in certification, and introduces the state machine in the criterion in details as well. After introducing the principle of stimulation modeling mechanism, the paper puts forward the method of establishing a stimulation model by equivalent trasforming the automata mentioned in the standard and ensures the accuracy of the model. It established the authentication model by adopting many different methods. Through analyzing the applicants and the authenticators which added new cores in the model, it was evident that the authentication affects the network performance at an early stage, then, after the network reached a stable states, there is no additional effects.
Keywords/Search Tags:WLAN, IEEE802.1x, EAP, Authentication, OPNET, Simulation
PDF Full Text Request
Related items