Author Login Editor-in-Chief Peer Review Editor Work Office Work

Computer Engineering ›› 2010, Vol. 36 ›› Issue (22): 153-154. doi: 10.3969/j.issn.1000-3428.2010.22.054

• Networks and Communications • Previous Articles     Next Articles

Research on Attack to WEP Protocol

LIU Yong-lei1a,2, JIN Zhi-gang1b   

  1. (1a. School of Computer Science and Technology; 1b. School of Electronic and Information Engineering, Tianjin University, Tianjin 300072, China; 2. Department of Electronic and Information Engineering, Tianjin Institute of Urban Construction, Tianjin 300384, China)
  • Online:2010-11-20 Published:2010-11-18

WEP协议攻击方法研究

刘永磊1a,2,金志刚1b   

  1. (1. 天津大学 a. 计算机科学与技术学院;b. 电子信息工程学院,天津 300072; 2. 天津城市建设学院电子与信息工程系,天津 300384)
  • 作者简介:刘永磊(1983-),男,讲师、博士研究生,主研方向:无线网络安全;金志刚,教授、博士生导师
  • 基金资助:
    天津大学自主创新基金资助项目;天津市高等学校科技发展计划基金资助项目(20090802);青海省科技支持计划基金资助项目“异构可信物联网关键技术研究”(2010-J-728)

Abstract: This paper introduces Wired Equivalent Privacy(WEP) protocol and RC4 used in WEP. Crrent researches in the method of attacking WEP protocol including chopchop, fragmentation attack, FMS attack and PTW attack are described. The attack principles are discussed respectively, and the root cause of attacking WEP successful and the necessity of switching to WPA/WPA2 are illustrated. These researches are analyzed and concluded.

Key words: Wireless Local Area Network(WLAN), Wired Equivalent Privacy(WEP) protocol, Wi-Fi Protected Access(WPA)

摘要: 介绍有线等效保密(WEP)协议及用到的RC4算法,论述针对WEP协议的chopchop攻击、分段攻击、FMS攻击和PTW攻击等。阐述各种攻击的攻击原理,指出攻击成功的根本原因和切换到WPA/WPA2安全体系的必要性。

关键词: 无线局域网, 有线等效保密协议, Wi-Fi联盟受限接入

CLC Number: