Abstract

With the popularization of the Internet, the related information technology is developing faster and faster, and the scale and complexity of the network are also increasing. Wireless networks cover all aspects of life, along with it, network security issues have gradually emerged. In recent years, network security vulnerabilities have been exposed continuously, from WiFi to Bluetooth, people gradually realize the security of wireless networks. The purpose of this article is to solve the existing security problems and study the operation process of RC4 and Advanced Encryption Standard algorithms, and the improvement scheme is put forward. This article is based on the inherent media access control address filtering technology of wireless network card; a dynamic security model for wireless networks is proposed and constructed. Devices accessing the network use 802.1x authentication method and distribute and set security status values for each device, the authentication server uses Remote Authentication Dial in User Service. This article uses the method of virtual private network encryption network to provide an encryption layer for communication between devices and wireless networks, thus, the data in network transmission can be encrypted and protected. In this article, the structure and strategy of Remote Authentication Dial in User Service are changed, in order to ensure the high security of wireless network equipment in the connection process. In the testing phase of this article, we have tested the model in detail several times. Tests are divided into middleman and session interception tests. A large number of test results show that this model can improve the security of wireless network and has good performance.

Highlights

  • Since the popularity of wireless networks, because of its obvious mobility advantages over wired networks, it has driven the development of many of our mobile devices

  • This article changes the structure and policy of Remote Authentication Dial in User Service (RADIUS) to ensure the high security of wireless network devices in the connection process

  • In order to verify the validity of the model, the following experiment will conduct a series of simulated attack tests and a simple test of the performance loss caused by virtual private network (VPN) encryption

Read more

Summary

Introduction

Since the popularity of wireless networks, because of its obvious mobility advantages over wired networks, it has driven the development of many of our mobile devices. The rapid development of wireless networks has broken through the constraints of wired network physical hardware, enabling the network to access anytime, anywhere, and accessing the Internet anytime, anywhere. The superiority plays an important role in the use of network applications and mobile portable devices.. A large number of wireless network users in China only stay on the basis of use, and have no security awareness for network security. Most of the wireless networks are deployed by users through wireless routers and portable WiFi devices. In order to save capital investment, the importance of security devices such as firewalls to wireless networks is ignored. It is bound to cause the very low security of small and medium-sized wireless networks.

Objectives
Methods
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call