嵌入式无线局域网检测系统的研究与开发
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
近年来,在社会需求和无线通信技术的推动下,无线局域网技术正以势不可当的趋势向前发展。无线局域网的可移动性、布线容易、组网灵活及成本优势等特点,更是促进了自身的发展。但是,在WLAN中,由于传送的数据是利用无线电波在空中辐射,它可以被发射机覆盖范围内任何WLAN终端所接收到。因此,在WLAN技术的发展过程中,安全问题则显得尤为重要。为了更好的使用、设计、安装、维护和管理无线局域网,必须要有方便、强大的测试工具对其进行测试。
     目前,在信息技术领域,微型化和专业化已经成为信息产业发展的一个新趋势,为了适应这一趋势,运用嵌入式技术开发嵌入式系统将会在不同领域得到广泛的应用。尤其是在无线和移动通信领域,开发嵌入式系统更是一个新的发展趋势。
     本文在深入理解802.11b和802.11g协议、TCP/IP协议及网络编程基础上,给出了无线监听技术的基本原理和方法,并利用这一技术,开发了嵌入式无线局域网检测系统。利用这一系统,您可以解决无线局域网在规划、设计、安装、维护及管理等各个阶段所遇到的问题;使无线局域网的日常维护工作变得简单、快速,提高了工作效率,这对无线局域网在各行业中得到更广泛的应用,具有非常重要的价值和积极的意义。
     本文内容包括:
     第一章从WLAN发展现状及国内外研究现状出发,提出嵌入式WLAN检测系统的研究开发,给出了系统的研究方案和研究内容。
     第二章介绍WLAN物理层(PHY)、媒体接入控制层(MAC)相关技术。
     第三章介绍系统的总体方案设计。
     第四章是智能数据采集模块的开发,介绍无线包捕获功能的实现。详细讨论了Libpcap及原始套接字(raw Socket)两种无线捕包的原理、方法,并给出了两种捕包方法的程序实现。
     第五章是WLAN的性能测试,即实现对无线局域网信号、站点等网络状况的检测,发现网络上非法设备及非法入侵,辅助进行无线局域网的规划设计,
Recent years, with the social demand and the technical push of wireless communication, WLAN technique is developing forward with strongly trend. WLAN has many distinct features, such as mobility, flexibility and easy deployment etc. all the characteristics promote itself development. however, the data of the transmission in the WLAN are radiating in the sky by the wireless electric wave, it can be received by any WLAN terminal within range of the transmission. Therefore, during the development of WLAN, the security problem seems to be important. Thus, for the sake of the better usage, to design, install, support and manage WLAN, it's very necessary to have a convenient and strong test tool.
    Currently, at the information technique realm, the miniaturization and profession have already become the new trend of information industry development, for adapting this trend, making use of a built-in technique to develop built-in system will get an extensive application in the different realm. especially in the wireless and the mobile correspondence realm, developing the built-in system is also a new development trend.
    This text is deeply comprehending the 802.11b and 802.11g protocol, TCP/IP protocol and network programming .giving the basic principle and method of wireless monitor, and make use of this technique, developing the Built-in WLAN Detection System. By this system, you can resolve some problems meet in programming, design, installation, maintenance and management etc. This make the daily maintenance work become in brief and fast and also enhance the work efficiency. It has much value and active meaning and must be got more extensive application in each WLAN profession.
    There are six important chapters in this paper:
    Chapter 1 introduces the WLAN's present research condition including the domestic and international study, we bring out the research of the Built-in WLAN Detection System, giving the research project of the system and research contents.
引文
[1] 刘乃安.无线局域网(WLAN)—原理、技术与应用[M].西安:西安电子科技大学出版社,2004
    [2] 严照楼,潘爱民.无线局域网的安全性研究[J].计算机工程与应用,2004(5)
    [3] Jim Geier.无线局域网[M].王群,李馥娟,叶清扬译.北京:人民邮电出版社,2001
    [4] 张威.网络编程教程[M].北京:希望电子出版社,2002
    [5] 谭思亮.网络与监听[M].北京:人民邮电出版社,2002
    [6] W Richard Stevens.TCP/IP详解[M].北京:机械工业出版社,1999
    [7] 网络监听攻击技术——数据包扑捉与协议分析,http://www.anheng.com.cn/news/html/network_troubleshooting/357.html
    [8] Moh, W. M, Dongming Yao, Makki, K. Wireless LAN: study of hidden-terminal effect and multimedia support. Computer Communications and Networks, 1998. Proceedings. 7th International Conference on, Pages: 422-431, 12-15 Oct, 1998
    [9] Haitao Wu, Shiduan Cheng, Yong Peng, Keping Long, Jian Ma. IEEE 802.11 distributed coordination function (DCF): analysis and enhancement. Communications, 2002. ICC 2002. IEEE International Conference on, Volume: 1, 28 April-2 May 2002 Pages: 605-609
    [10] Wookwon Lee, Khan, M. A. CSMA/CA with multiple-variable contention window for wireless multimedia communication systems[J]. Telecommunications, 2003. ICT 2003. 10th International Conference on, Volume: Pages: 938-942 vol. 2, 2, 23 Feb. -1 March 2003
    [11] What hackers don't want you to know about securing your wireless LAN. www.airmagnet.com
    [12] 张丰翼,刘晓寒,马文平,王新梅.无线局域网安全的关键问题[J].信息安全与通信保密,2004(5)
    [13] ANSI/IEEE Std 802.11b-1999,802.11g-2003 Edition
    [14] Borisoy, Goldberg, Wagner, Intercepting Mobile communications: The Insecurity of 802. 11-Draft
    [15] 陶晓明,孙树峰.无线安全协议802.1x的认证研究[J]现代电子技术,2004(13)
    [16] 李林,李晖,王丹卉.基于802.1x协议的无线局域网安全性研究[J].电子科技,2004(7)
    [17] 唐正军.入侵检测技术导论[M].北京:机械工业出版社,2004
    [18] Qt Reference Documentation. http://doc.trolltech.com/3.3/index.html
    [19] Steve Russell. Detecting and Locating Rogue Access Points
    [20] 谢希仁.计算机网络(第二版).电子工业出版社,1999、4
    [21] Arunesh Mishra, William A. Arbaugh. An Initial Security Analysis of the IEEE 802.1X Standard, http://www.cs.umd.edu.2002
    [22] Linux下的多线程编程,http://linux.chinaunix.net/doc/program/2001-08-11/642.shtml
    [23] Linux下Qt虚拟开发环境的建立,http://www.turbozv.com/index.php?job=art&articleid=a_20050104_09 2206
    [24] p80211metastruct, h[OL], http://wifiscanner.sourceforge.net/dox/p80211metastruct_8h-source.html
    [25] Network Research Group, Lawrence Berkeley National Laboratory, Libpcap-0.7.2源程序代码,2001-2002
    [26] Mike Kershaw wireless.net kismet-2.8.0源程序代码
    [27] Jouni Malinen.SSH Communications Security Corp,hostap-0.0.4源程序代码
    [28] ARM Linux Development, http://arm.nihilisme.ca/
    [29] IEEE Std. 802.1x—2001, IEEE Standards for Local and Metropolitan Area Network: Port—based Network Access Control, 2001
    [30] Lynn, Mike and Robert Baird. "Advanced 802.11 Attack", presentation to Black Hat 2002 Conference, Las Vegas, NV 31 July 2002, Available at http://www.blackhat.com/presentations/bh-usa-02/baird-lynn/bn-us-lynn-802.11 attack ppt last accessed 20 September 2002
    [31] Randall K. Nichols Panos C. Lekkas. "Wireless Security-Models, Threats, and Solutions"
    [32] L. Blunk, J. Vollbrecht."PPP Extensible Authentication Protocol(EAP)" Tech. Rep. RFC2284, Internet Engineering Task Force (IETF), March 1998
    [33] Network Working Group, "Remote Authentication Dial In User Service (RADIUS)"RFC2138[S], Internet Engineering Task Force (IETF), 1997.
    [34] N.Borisov, I.Goldberg and D. Wagner. "Intercepting Mobile Communications: The Insecurity of 802.11, " In Proc. International Conference on Mobile Computing and Networking: pages 180-189, ACM, 2001
    [35] Sandra, Kay and Miller. "Facing the challenge of wireless security, " IEEE Computer, volume: 34 Issue: 6, p16—p18, 2001
    [36] Aad, I Castelluccia, c. Differentiation mechanisms for IEEE 802.11. INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, Volume: 1 , pages:209-218 vol.1, 22-26 April 2001
    [37] Shgong Xu , Tarek Saadawi. Does the IEEE 802.11 MAC Protocol Work Well in Multihop Wireless Ad Hoc Networks?. Communications Magazine, IEEE, Volume: 39, Issue: 6 June 2001. Pages:130-137
    [38] Kane Jason, Yen.David C. Breaking the barriers of connectivity: an analysis of the wireless LAN Computer Standards & Interfaces Volume:24, Issue: 1, March, 2002, pp. 5-20
    [39] Joshua Wright .Detecting Wireless LAN MAC Address Spoofing, http://home.jwu.edu/jwright.2003
    
    [40] What hackers don' t want you to know about securing your wirele ss LAN[OL], www.AirMagnet.com
    [41] Jamil Farshchi.Wireless Intrusion Detection Systems[OL], www.securityfocus.com/infocus/1742

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700