The identity authentication of Wi-Fi system based on network security
With the wide distribution of hot spots, in order to facilitate users to access the network at anytime and anywhere, the current network technology has developed a convenient and fast hot spot sharing system and has been popularized in daily life. However, the convenience of the information society...
Gespeichert in:
Veröffentlicht in: | Annales des télécommunications 2021-06, Vol.76 (5-6), p.313-320 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | With the wide distribution of hot spots, in order to facilitate users to access the network at anytime and anywhere, the current network technology has developed a convenient and fast hot spot sharing system and has been popularized in daily life. However, the convenience of the information society also hides network security dangers. The purpose of this paper is to study and analyze the security problems existing in current Wi-Fi sharing applications by designing two different network authentication programs. In this paper, ieeee802.1x protocol is used for wireless access, eap-tls and RADIUS bidirectional authentication mechanism to achieve the authentication of access users, and one-time password authentication technology is used in Fat AP networking mode. Aiming at the defects of S/KEY protocol, such as server impersonation and system crash, an authentication scheme combining DES and RSA algorithm is proposed and implemented. The authentication scheme in network mode retains the advantage of simple operation of static cryptography system. By adding uncertainties, the security of the authentication system can be improved. The encrypted information is used to encrypt the transmitted information to ensure the confidentiality of the information during transmission. After successful authentication, session key negotiation is completed to ensure the security of subsequent communication. This scheme has a success rate of more than 95% after the experiment, is simple in design, high in security, low in cost, and does not need the participation of the third party, which is very suitable for solving the problems of user authentication and communication confidentiality in the shared system. |
---|---|
ISSN: | 0003-4347 1958-9395 |
DOI: | 10.1007/s12243-020-00793-0 |