Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 405-408, 427.

• Information Security • Previous Articles     Next Articles

Security of User Access to Single SSID Wireless Network

WANG Li1,2,4, XIA Ming-shan1,2, WEI Zhan-chen3,4, QI Fa-zhi1,2,3, CHEN Gang3   

  1. (Dongguan Branch,Institute of High Energy Physics,Chinese Academy of Sciences,Dongguan,Guangdong 523803,China)1;
    (Spallation Neutron Science Center,Dongguan,Guangdong 523803,China)2;
    (Computing Center,Institute of High Energy Physics,Chinese Academy of Sciences,Beijing 100049,China)3;
    (University of Chinese Academy of Sciences,Beijing 100049,China)4
  • Online:2019-11-10 Published:2019-11-20

Abstract: Aiming at the security problems existing in the current single SSID wireless network that different identity users who are authenticated and authorized can access the wireless network anytime and anywhere,resulting in the same use of wireless networks by users with different identities, such as bandwidth,access control (ACL) and so on,this paper proposed a solution that grouping users access to the wireless network based on 802.1 X and VLAN technology,and implemented the solution with FreeRADIUS technology.The deployment experiment of the solution proves that when users of different identities acces the same wireless network,the proposed scheme can set different access policies,which effectively improves the security and simplifies the management of wireless network.

Key words: WLAN, Access security, 802.1X, VLAN, Grouping users

CLC Number: 

  • TP393
[1]李振兴.无线网络安全面临的技术挑战及未来趋势[J].软件学报,2016,27(6):1328-1348.
[2]张博,高松.无线网络安全技术分析[J].信息安全与技术,2013(2):32-34.
[3]宋永进.4G无线通信系统的网络安全分析[J].网络安全技术与应用,2017(9):101-120.
[4]张焕国,韩文报,来学嘉,等.网络空间安全综述[J].中国科学:信息科学,2016,46(2):125-164.
[5]乔恩·爱德尼,威廉·阿尔保.无线局域网安全实务-WPA 与 802.11i[M].北京:人民邮电出版社,2006:37-45.
[6]冯栋柱,杨登.基于VLAN技术在高校校园网建设中的应用[J].网络与通信,2010(26):131-134.
[7]谭润芳.无线网络安全性探讨[J].信息科技,2008,37(6):24-26.
[8]沈芳阳.基于IEEE802.11系列标准的无线局域网安全性研究[D].广州:广东工业大学,2004.
[9]吴贤平.基于802.1x的校园网用户身份认证设计与实现[J].制造业自动化,2012,34(5):47-49.
[10]李丹,闫晓弟,耶健,等.基于开放源码软件Freeradius的无线网络认证系统实现[J].中国现代教育装备,2012(17):65-67.
[11]王志军,张帆.虚拟网络技术在计算机网络信息安全中的应用研究 [J].科技创新与应用,2017,4403:93.
[12]文峰.计算机网络病毒与网络安全维护探究 [J].计算机光盘软件与应用,2015.
[13]胡俊.计算机网络安全技术在网络安全维护中的应用研究[J].科技风,2014(15):54.
[14]李文琴,汪大清.VLAN技术在组建校园网中的应用[J].计算机与现代化,2007(5):76-78.
[15]商阳.VLAN技术及其在校园网中的应用[J].科技信息,2007(33):391.
[1] WANG Dong, YUAN Wei, WU Di. Monitoring System for Library Environment Based on WiFi Internet of Things [J]. Computer Science, 2018, 45(11A): 532-534,557.
[2] SHI Zhi-kai and ZHU Guo-sheng. WF-C4.5:Handheld Terminal Traffic Identification Method Based on C4.5 Decision Tree in WiFi Environment [J]. Computer Science, 2017, 44(Z6): 270-273.
[3] GAO Wan-ling, HONG Mei, YANG Qiu-hui and ZHAO He. Efficiency Analysis of Different Statistical Algorithms on Statistical Model Checking [J]. Computer Science, 2017, 44(Z6): 499-503, 533.
[4] WANG Yue. Impact of Path Loss Exponent on Interference and Carrier Sensing Performance Metrics of 802.11 WLANs [J]. Computer Science, 2017, 44(7): 84-88.
[5] LIU Yi, YE Yuan-hang and LING Jie. Transmission Interference Prediction Approach in WLAN Channel [J]. Computer Science, 2015, 42(10): 106-112.
[6] YE Jin,LI Tao-shen,WANG Zheng-fei and ZHANG Xiang-li. Defense Mechanism against Misbehavior of MAC Layer in WLAN [J]. Computer Science, 2013, 40(12): 90-93.
[7] XIE Dai-jun,HU Han-ying and KONG Fan-zeng. Indoor Positioning Algorithm for WLAN Based on Distribution Overlap and Feature Weighting [J]. Computer Science, 2013, 40(11): 38-42.
[8] . Optimal Window Based Backoff Algorithm for IEEE 802. 1 1 WLANs [J]. Computer Science, 2012, 39(1): 82-84.
[9] XU Lin,ZHU Yi-hua,HU Hua. Delay Aware Power Management Scheme for WLANs [J]. Computer Science, 2011, 38(10): 113-116.
[10] ZHANG Li-zhuo,JIA Wei-jia,ZHOU Shi-fei. Research on Improved Handoff Scheme between 3G and WLAN Networks [J]. Computer Science, 2010, 37(3): 49-51.
[11] . [J]. Computer Science, 2009, 36(3): 112-115.
[12] . [J]. Computer Science, 2009, 36(3): 48-50.
[13] HUANG Jia-wei, WANG Jian-xin (School of Information Science and Engineering,Central South University,Changsha 410083,China). [J]. Computer Science, 2009, 36(2): 42-46.
[14] LI Yan, ZHU Guang-Xi (Wuhan Optical-Electrouc National Laboratory, Huazhong University of Science and Technology, Wuhan 430074). [J]. Computer Science, 2008, 35(4): 28-32.
[15] WANG Hua,  WANG Xin,  XUE Xiang-Yang (Department of Computer Science, Fudan University, Shanghai 200433). [J]. Computer Science, 2007, 34(8): 18-23.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] DU Wei, DING Shi-fei. Overview on Multi-agent Reinforcement Learning[J]. Computer Science, 2019, 46(8): 1 -8 .
[2] GAO Li-zheng, ZHOU Gang, LUO Jun-yong, LAN Ming-jing. Survey on Meta-event Extraction[J]. Computer Science, 2019, 46(8): 9 -15 .
[3] CAI Li, LI Ying-zi, JIANG Fang, LIANG Yu. Study on Clustering Mining of Imbalanced Data Fusion Towards Urban Hotspots[J]. Computer Science, 2019, 46(8): 16 -22 .
[4] YANG Zhen, WANG Hong-jun. Important Location Identification of Mobile Users Based on Trajectory Division and Density Clustering Method[J]. Computer Science, 2019, 46(8): 23 -27 .
[5] DENG Cun-bin, YU Hui-qun, FAN Gui-sheng. Integrating Dynamic Collaborative Filtering and Deep Learning for Recommendation[J]. Computer Science, 2019, 46(8): 28 -34 .
[6] ZHONG Feng-yan, WANG Yan, LI Nian-shuang. Node Selection Scheme for Data Repair in Heterogeneous Distributed Storage Systems[J]. Computer Science, 2019, 46(8): 35 -41 .
[7] SUN Guo-dao, ZHOU Zhi-xiu, LI Si, LIU Yi-peng, LIANG Rong-hua. Spatio-Temporal Evolution of Geographical Topics[J]. Computer Science, 2019, 46(8): 42 -49 .
[8] ZHANG Hui-bing, ZHONG Hao, HU Xiao-li. User Reviews Clustering Method Based on Topic Analysis[J]. Computer Science, 2019, 46(8): 50 -55 .
[9] LI Bo-jia, ZHANG Yang-sen, CHEN Ruo-yu. Method for Generating Massive Data with Assignable Distribution[J]. Computer Science, 2019, 46(8): 56 -63 .
[10] LU Xian-guang, DU Xue-hui, WANG Wen-juan. Alert Correlation Algorithm Based on Improved FP Growth[J]. Computer Science, 2019, 46(8): 64 -70 .