Weili Huang’s research while affiliated with Hebei University of Engineering and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (2)


The Research of VPN on WLAN (PDF)
  • Article

December 2010

·

100 Reads

·

11 Citations

Weili Huang

·

Fanzheng Kong

VPN technology is an effective method and easy to realize on WLAN. Several of VPN technologies have already been widely used nowadays. Each of them has its advantages and disadvantages. this paper introduces the working principle of SSL VPN and IPSec VPN, then analyzes these two kinds of VPN scheme of the advantages and disadvantages, finally several aspects such as the field of application the security strategy 、Installation were Analysis and compared.


IEEE802.1x of protocol analysis and improvement

August 2010

·

13 Reads

·

3 Citations

Wireless local area network (WLAN) is more and more received people's favor by some superiority, for example, fast deployment, speed higher and so on. With the development of wireless WLAN, its network security issues become more attention. Security problem is still insufficient in the current IEEE802.1× series of standard; it has become an important research topic that how to ensure the security of WLAN. This paper proposes the improved program of protocol for IEEE802.1× protocol's flaw that it suffers the denial of server (DOS) attack and Man-in-the-Middle (MITM) Attack.

Citations (2)


... The frame structure of EAPoL and EAP [12,16] are mentioned inFigure 6. Type and Type-Data in EAP frame is coming under one category called, " Data " . Data field is 0 in Success and Failure packets. ...

Reference:

Attacks Due to Flaw of Protocols Used In Network Access Control (NAC), Their Solutions and Issues: A Survey
IEEE802.1x of protocol analysis and improvement
  • Citing Article
  • August 2010

... In addition, it provides many uses for wireless communication networks to determine both management and security policies within a company. It also enables operators to integrate any isolation level by separating hosts into different broadcast domains [2]. There are a number of reasons to create VLANs, but the primary one is traffic control; as a LAN expands and more network devices are added, the frequency of the broadcast also grows, causing the network to become very data-congested. ...

The Research of VPN on WLAN (PDF)
  • Citing Article
  • December 2010