Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 405-408, 427.

• Information Security • Previous Articles     Next Articles

Security of User Access to Single SSID Wireless Network

WANG Li1,2,4, XIA Ming-shan1,2, WEI Zhan-chen3,4, QI Fa-zhi1,2,3, CHEN Gang3   

  1. (Dongguan Branch,Institute of High Energy Physics,Chinese Academy of Sciences,Dongguan,Guangdong 523803,China)1;
    (Spallation Neutron Science Center,Dongguan,Guangdong 523803,China)2;
    (Computing Center,Institute of High Energy Physics,Chinese Academy of Sciences,Beijing 100049,China)3;
    (University of Chinese Academy of Sciences,Beijing 100049,China)4
  • Online:2019-11-10 Published:2019-11-20

Abstract: Aiming at the security problems existing in the current single SSID wireless network that different identity users who are authenticated and authorized can access the wireless network anytime and anywhere,resulting in the same use of wireless networks by users with different identities, such as bandwidth,access control (ACL) and so on,this paper proposed a solution that grouping users access to the wireless network based on 802.1 X and VLAN technology,and implemented the solution with FreeRADIUS technology.The deployment experiment of the solution proves that when users of different identities acces the same wireless network,the proposed scheme can set different access policies,which effectively improves the security and simplifies the management of wireless network.

Key words: WLAN, Access security, 802.1X, VLAN, Grouping users

CLC Number: 

  • TP393
[5]乔恩·爱德尼,威廉·阿尔保.无线局域网安全实务-WPA 与 802.11i[M].北京:人民邮电出版社,2006:37-45.
[11]王志军,张帆.虚拟网络技术在计算机网络信息安全中的应用研究 [J].科技创新与应用,2017,4403:93.
[12]文峰.计算机网络病毒与网络安全维护探究 [J].计算机光盘软件与应用,2015.
[1] WANG Dong, YUAN Wei, WU Di. Monitoring System for Library Environment Based on WiFi Internet of Things [J]. Computer Science, 2018, 45(11A): 532-534,557.
[2] SHI Zhi-kai and ZHU Guo-sheng. WF-C4.5:Handheld Terminal Traffic Identification Method Based on C4.5 Decision Tree in WiFi Environment [J]. Computer Science, 2017, 44(Z6): 270-273.
[3] GAO Wan-ling, HONG Mei, YANG Qiu-hui and ZHAO He. Efficiency Analysis of Different Statistical Algorithms on Statistical Model Checking [J]. Computer Science, 2017, 44(Z6): 499-503, 533.
[4] WANG Yue. Impact of Path Loss Exponent on Interference and Carrier Sensing Performance Metrics of 802.11 WLANs [J]. Computer Science, 2017, 44(7): 84-88.
[5] LIU Yi, YE Yuan-hang and LING Jie. Transmission Interference Prediction Approach in WLAN Channel [J]. Computer Science, 2015, 42(10): 106-112.
[6] YE Jin,LI Tao-shen,WANG Zheng-fei and ZHANG Xiang-li. Defense Mechanism against Misbehavior of MAC Layer in WLAN [J]. Computer Science, 2013, 40(12): 90-93.
[7] XIE Dai-jun,HU Han-ying and KONG Fan-zeng. Indoor Positioning Algorithm for WLAN Based on Distribution Overlap and Feature Weighting [J]. Computer Science, 2013, 40(11): 38-42.
[8] . Optimal Window Based Backoff Algorithm for IEEE 802. 1 1 WLANs [J]. Computer Science, 2012, 39(1): 82-84.
[9] XU Lin,ZHU Yi-hua,HU Hua. Delay Aware Power Management Scheme for WLANs [J]. Computer Science, 2011, 38(10): 113-116.
[10] ZHANG Li-zhuo,JIA Wei-jia,ZHOU Shi-fei. Research on Improved Handoff Scheme between 3G and WLAN Networks [J]. Computer Science, 2010, 37(3): 49-51.
[11] . [J]. Computer Science, 2009, 36(3): 112-115.
[12] . [J]. Computer Science, 2009, 36(3): 48-50.
[13] HUANG Jia-wei, WANG Jian-xin (School of Information Science and Engineering,Central South University,Changsha 410083,China). [J]. Computer Science, 2009, 36(2): 42-46.
[14] LI Yan, ZHU Guang-Xi (Wuhan Optical-Electrouc National Laboratory, Huazhong University of Science and Technology, Wuhan 430074). [J]. Computer Science, 2008, 35(4): 28-32.
[15] WANG Hua,  WANG Xin,  XUE Xiang-Yang (Department of Computer Science, Fudan University, Shanghai 200433). [J]. Computer Science, 2007, 34(8): 18-23.
Full text



[1] DU Wei, DING Shi-fei. Overview on Multi-agent Reinforcement Learning[J]. Computer Science, 2019, 46(8): 1 -8 .
[2] GAO Li-zheng, ZHOU Gang, LUO Jun-yong, LAN Ming-jing. Survey on Meta-event Extraction[J]. Computer Science, 2019, 46(8): 9 -15 .
[3] CAI Li, LI Ying-zi, JIANG Fang, LIANG Yu. Study on Clustering Mining of Imbalanced Data Fusion Towards Urban Hotspots[J]. Computer Science, 2019, 46(8): 16 -22 .
[4] YANG Zhen, WANG Hong-jun. Important Location Identification of Mobile Users Based on Trajectory Division and Density Clustering Method[J]. Computer Science, 2019, 46(8): 23 -27 .
[5] DENG Cun-bin, YU Hui-qun, FAN Gui-sheng. Integrating Dynamic Collaborative Filtering and Deep Learning for Recommendation[J]. Computer Science, 2019, 46(8): 28 -34 .
[6] ZHONG Feng-yan, WANG Yan, LI Nian-shuang. Node Selection Scheme for Data Repair in Heterogeneous Distributed Storage Systems[J]. Computer Science, 2019, 46(8): 35 -41 .
[7] SUN Guo-dao, ZHOU Zhi-xiu, LI Si, LIU Yi-peng, LIANG Rong-hua. Spatio-Temporal Evolution of Geographical Topics[J]. Computer Science, 2019, 46(8): 42 -49 .
[8] ZHANG Hui-bing, ZHONG Hao, HU Xiao-li. User Reviews Clustering Method Based on Topic Analysis[J]. Computer Science, 2019, 46(8): 50 -55 .
[9] LI Bo-jia, ZHANG Yang-sen, CHEN Ruo-yu. Method for Generating Massive Data with Assignable Distribution[J]. Computer Science, 2019, 46(8): 56 -63 .
[10] LU Xian-guang, DU Xue-hui, WANG Wen-juan. Alert Correlation Algorithm Based on Improved FP Growth[J]. Computer Science, 2019, 46(8): 64 -70 .