Research and Implementation of Security Wireless LANs based on EAP-TLS and IPSec VPN

被引:0
|
作者
Zhou Li [1 ]
Tan Fang-yong [1 ]
Gao Xiao-hui [1 ]
机构
[1] Suzhou Vocat Univ, Dept Comp Engn, Suzhou 215104, Peoples R China
关键词
WLAN; IEEE; 802.1X; EAP-TLS; IPsec; VPN;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we focus on a feasible security solution to WLAN. We first analyzed EAP-TLS and the IPSec support mechanism in Linux. Secondly, we implemented EAP-TLS authentication and VPN gateways. This paper illustrates the configuration of STA, AP and RADIUS server and the application of ipsec-tool. It also summarizes the security considerations of the solution associating EAP-TLS with IPSec VPN.
引用
收藏
页码:80 / 83
页数:4
相关论文
共 50 条
  • [41] Research and Implementation Based on Web Services Security Model
    Liu, Wan-jun
    Li, Yang
    [J]. 2010 INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATION AND 2010 ASIA-PACIFIC CONFERENCE ON INFORMATION TECHNOLOGY AND OCEAN ENGINEERING: CICC-ITOE 2010, PROCEEDINGS, 2010, : 129 - 132
  • [42] A Design and Implementation Method of IPSec Security Chip for Power Distribution Network System Based on National Cryptographic Algorithms
    Xi, Wei
    Suo, Siliang
    Cai, Tiantian
    Jian, Ganyang
    Yao, Hao
    Fan, Lin
    [J]. PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 2307 - 2310
  • [43] The implementation of IPsec-based internet security system in IPv4/IWPv6 network
    Park, SH
    Nah, JH
    Chung, K
    [J]. ARTIFICIAL INTELLIGENCE AND SIMULATION, 2004, 3397 : 109 - 116
  • [44] Research and implementation of grid security mode based on identity authentication
    Li, Ma
    Zheng Weimin
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 4, 2008, : 499 - 503
  • [45] Remote Monitoring System Research and Implementation Based on Wireless Communication
    Fu, Weizhi
    Meng, Xiaofeng
    [J]. FIFTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2012): COMPUTER VISION, IMAGE ANALYSIS AND PROCESSING, 2013, 8783
  • [46] Research and design the embedded wireless security system of vehicle based on the GPRS
    YU Xiantao
    LI Yongheng
    Peng Jinwang
    [J]. ISTM/2007: 7TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-7, CONFERENCE PROCEEDINGS, 2007, : 3117 - 3120
  • [47] Research on Physical Layer Security Schemes based on Cooperative Wireless Communication
    Song Wenbo
    [J]. 2015 SEVENTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2015), 2015, : 888 - 891
  • [48] The research of mobile route positioning security based on wireless sensor network
    [J]. Xia, L. (584558260@qq.com), 1600, Advanced Institute of Convergence Information Technology (04):
  • [49] Research and Implementation on Key Information Security Algorithm Based on GOOSE Message
    Wang Ning
    Liu Guangxing
    Wu Yanli
    Chen Yong'an
    Yao Ruize
    Liu Yunhua
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON VISION, IMAGE AND SIGNAL PROCESSING (ICVISP 2018), 2018,
  • [50] Research and Implementation of Resource Scheduling Mechanism Based On Software Defined Security
    Wang, Zelang
    Shou, Guochu
    Hu, Yihong
    Guo, Zhigang
    [J]. 2016 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY PROCEEDINGS - CYBERC 2016, 2016, : 372 - 376