会议专题

Wireless LAN Security Enhancement through Trusted Computing Technology

  Wireless communication can provide ubiquitous access to the Internet and more convenience thanwired communication. Due to the wide open nature of wireless radio, security situation of wireless network ismore serious. From the initial 802.11 to 802.11i, more robust security methods have been adopted to eliminateunderlying attacks. 802.11i is based on the assumption that all participants are honest that they will act as theyare expected. But usually it is not true. How to recognize a genuine user, how to keep authentication data safely,and how to prevent dishonest supplicant accessing WLAN are big challenges. Trusted Computing can be used toimprove security status of endpoint. Applying Trusted Computing technology can solve these challenges andenhance WLAN security.

Security WEP 802.11i Trusted Computing Remote Attestation

Jian SHEN Yang XU Yi ZHOU

Digital Campus Management Center Suzhou Institute of Trade & Commerce Suzhou, 215009 Suzhou Vangogh technology co. ltd Suzhou 215008

国内会议

2011年亚太青年通信学术会议(APYCC2011)

杭州

英文

110-114

2011-08-07(万方平台首次上网日期,不代表论文的发表时间)