LAN LAN LAN LAN LAN LAN,, i

Similar documents
i

25 About what prevent spoofing of misusing a session information

Web Basic Web SAS-2 Web SAS-2 i


Web Web Web Web i

Wi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i

7,, i

WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i

17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System

DTN DTN DTN DTN i

Web Web Web Web Web, i

58 10

P2P P2P peer peer P2P peer P2P peer P2P i

AirMac ネットワーク for Windows

,,.,,., II,,,.,,.,.,,,.,,,.,, II i

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment

soturon.dvi

21 VoIP An encrypted VoIP communication system for mobile telephones

卒業論文2.dvi

WebRTC P2P,. Web,. WebRTC. WebRTC, P2P, i

AirMac ネットワーク構成の手引き

21 Key Exchange method for portable terminal with direct input by user

21 e-learning Development of Real-time Learner Detection System for e-learning

, IT.,.,..,.. i

InterSafe Personal_v2.3 ユーザーズガイド_初版

,,.,.,,.,.,.,.,,.,..,,,, i

P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i

GPGPU


Web Web ID Web 16 Web Web i

名称未設定

WMN Wi-Fi MBCR i

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D

IT i

11 Windows XP IP WEP (Web )

P2P P2P Winny 3 P2P P2P 1 P2P, i

( )

TOOLS for UR44 Release Notes for Windows

21 A contents organization method for information sharing systems

ViewSonic Corporation, Macintosh Power Macintosh Microsoft Windows Windows ViewSonic 3 OnView ViewMatch ViewMeter ViewSonic ViewSonic, ViewSonic

Vol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L

i


Wide Scanner TWAIN Source ユーザーズガイド

EPSON EasyMP Multi PC Projection Ver.1.20 Operation Guide

27 VR Effects of the position of viewpoint on self body in VR environment

名称未設定


Shonan Institute of Technology MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 Ships1 * ** ** ** Development of a Small-Mid Range Paral

,.,.,,.,. X Y..,,., [1].,,,.,,.. HCI,,,,,,, i

Sobel Canny i

LANFTP 1 FTP 047 PC 016 FTP HTTP 024 iphone Camera Control Pro 2 ii

23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h


EPSON EasyMP Multi PC Projection Ver.1.10 Operation Guide

28 Horizontal angle correction using straight line detection in an equirectangular image

EPSON EasyMP Multi PC Projection Ver.1.00 Operation Guide


paper.dvi

IT,, i

名称未設定

IEEE802.11n LAN WiMAX(Mobile Worldwide Interoperability for Microwave Access) LTE(Long Term Evolution) IEEE LAN Bluetooth IEEE LAN

25 Removal of the fricative sounds that occur in the electronic stethoscope

indd

Parallels Desktop : Parallels Transporter ( VMware Microsoft Virtual PC VirtualBox ) Parallels Image Tool Parallels Mounter 2. ( build ) Para

SmartLMSユーザーズガイド<講師編>

EPSON EasyMP Multi PC Projection Ver.1.11 Operation Guide

PX-K100

EPSON EasyMP Network Projection Ver.2.85 Operation Guide

橡Webcamユーザーガイド03.PDF

Core1 FabScalar VerilogHDL Cache Cache FabScalar 1 CoreConnect[2] Wishbone[3] AMBA[4] AMBA 1 AMBA ARM L2 AMBA2.0 AMBA2.0 FabScalar AHB APB AHB AMBA2.0

4.1 % 7.5 %

,,,,., C Java,,.,,.,., ,,.,, i

EPSON EasyMP Network Projection Ver.2.82 Operation Guide

EPSON Easy Interactive Tools Ver.2 Operation Guide

EPSON EasyMP Network Projection Ver.2.70 Operation Guide

atama.dvi

, (GPS: Global Positioning Systemg),.,, (LBS: Local Based Services).. GPS,.,. RFID LAN,.,.,.,,,.,..,.,.,,, i

Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking

2 [2] Flow Visualizer 1 DbD 2. DbD [4] Web (PV) Web Web Web 3 ( 1) ( 1 ) Web ( 2 ) Web Web ( 3 ) Web DbD DbD () DbD DbD DbD 2.1 DbD DbD URL URL Google

29 jjencode JavaScript

2017 (413812)

20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow

AV 1000 BASE-T LAN 90 IEEE ac USB (3 ) LAN (IEEE 802.1X ) LAN AWS (Amazon Web Services) AP 3 USB wget iperf3 wget 40 MBytes 2 wget 40 MByt

1 I/F I/F 1 6) MobileIP 7) 8) MN: Monile Node MN AR Mobility Anchor Point(MAP) MobileIP HMIP HMIP HA-MAP MN MAP MN MAP HMIP MAP MN 2 MobileIP Mo

TCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of

ネットワークビデオレコーダー VK-64/VK-16/VK-Lite v2.2 セットアップガイド


konicaminolta.co.jp PageScope Net Care

企業内システムにおけるA j a x 技術の利用

V ERP Standard Edition 1 ST ST TOE TOE TOE TOE TOE TOE // TOE

SOM SOM(Self-Organizing Maps) SOM SOM SOM SOM SOM SOM i



[1] [2] [3] (RTT) 2. Android OS Android OS Google OS 69.7% [4] 1 Android Linux [5] Linux OS Android Runtime Dalvik Dalvik UI Application(Home,T

Vol.57 No (Mar. 2016) 1,a) , L3 CG VDI VDI A Migration to a Cloud-based Information Infrastructure to Support

o 2o 3o 3 1. I o 3. 1o 2o 31. I 3o PDF Adobe Reader 4o 2 1o I 2o 3o 4o 5o 6o 7o 2197/ o 1o 1 1o

PC Link Tool PC Link Tool PC Link Tool PC Link Tool


Ironman_CMKK.fm

Transcription:

22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4

LAN LAN LAN LAN LAN LAN,, i

Abstract A secure wireless communication system using virtualization technologies Hoji, Yusei In recent years, the network construction using wireless LAN have been increasing in companies and organizations. Wireless LAN is easy to move and inexpensive introduction costs and operation costs than wired LAN. Wireless LAN is the risk of falsification and eavesdropping and spoofing. So security is required. Because the security measures required costs, in order to construct an inexpensive network would require expensive security measures. Therefore, the wireless LAN communication method to build secure networks at low cost. However, wireless LAN communication system may not be available depending upon operating environment. Propose a method of A secure wireless communication system using virtualization technologies. And verify system. And, by using virtualization software, which can be easily introduced to the operating environment does not work environment. Verify the feasibility of different operating environments in the verification the proposed system. key words Wireless Network, User Authentication, Virtualization technologies ii

1 1 2 LAN 4 2.1................................. 4 2.2.................................. 4 2.3 IEEE802.1X/EAP.............................. 5 2.4..................... 8 3 9 3.1.......................... 9 3.2....................... 10 4 14 4.1................................ 14 4.1.1................. 15 4.1.2.................................. 15 4.1.3............................... 16 4.1.4....................... 16 4.1.5 LAN.......................... 16 5 17 5.1.................................. 17 5.1.1.................... 17 5.1.2..................... 18 5.1.3...................... 18 iii

5.1.4 Mac OS X................. 18 5.1.5 Ubuntu Linux............... 19 5.2................................... 20 5.3...................................... 20 6 25 26 27 iv

1.1 LAN........................... 2 1.2 LAN LAN.................. 3 2.1 IEEE802.1X/EAP................... 6 2.2 IEEE802.1X/EAP.................. 7 3.1 OS............................ 11 3.2........................ 12 3.3......................... 13 4.1.................................... 15 5.1 Mac OS X........................ 21 5.2 Ubuntu Linux...................... 22 5.3 Mac OS X........................ 23 5.4 Ubuntu Linux...................... 24 v

2.1 EAP......................... 8 5.1........................ 17 5.2 VirtualBox................. 19 5.3 Mac OS X.................... 19 5.4 Ubuntu Linux.................. 19 vi

1 1.1 [1] 1.2 LAN Local Area Network [2] LAN LAN LAN LAN LAN LAN [3] 2 LAN 3 4 LAN 5 6 1

1.1 LAN 2

1.2 LAN LAN 3

2 LAN LAN 2.1 LAN 2.2 LAN LAN. ID 4

2.3 IEEE802.1X/EAP 2.3 IEEE802.1X/EAP IEEE802.1X IEEE802.1X LAN LAN LAN EAP Extensible Authentication Protocol IEEE802.1X [4] EAP IEEE802.1X/EAP 2.1 EEE802.1X/EAP 2.2 IEEE802.1X/EAP 5

2.3 IEEE802.1X/EAP 2.1 IEEE802.1X/EAP 6

2.3 IEEE802.1X/EAP 2.2 IEEE802.1X/EAP 7

2.4 2.4 WPA2 Enterprise WPA2 Enterprise IEEE802.1X/EAP EAP 2.1 EAP [5] IEEE802.1X/EAP EAP-IPN EAP-IPN EAP-IPN EAP-IPN 2.1 EAP EAP-FAST EAP-TLS EAP-IPN 8

3 3.1 OS OS [6] OS OS OS OS OS OS Operating System OS OS OS OS OS CPU HDD USB 9

3.2 3.2 OS 10

3.2 3.1 OS 11

3.2 3.2 12

3.2 3.3 13

4 LAN 4.1 LAN LAN 4.1 LAN OS LAN LAN 2 LAN OS proxy proxy LAN 14

4.1 4.1 4.1.1 LAN LAN USB2.0 2 4.1.2 LAN Windows OS. Windows OS OS 15

4.1 4.1.3 LAN OS OS Windows OS Windows XP Windows Vista Windows 7 4.1.4 LAN 2 LAN 4.1.5 LAN LAN LAN LAN EAP-IPN LAN 16

5 5.1 Mac OS X Ubuntu Linux 2 OS OS 5.1.1 5.1 OS LAN Windows XP SP3 Proxy ANHTTPD Server 1.42p [9] USB LAN PCI GW-US54GXS 5.1 HDD OS 40GB 1280MB Windows XP SP3 OS Mac OS 10.6.6 17

5.1 5.1.2 VirtualBox4.0.4[7] USB2.0 VirtualBox 4.0.4 Oracle VM VirtualBox Extension Pack 5.1.3 5.2 VirtualBox NAT 2 HTTP Proxy 5.1.4 Mac OS X Mac OS X 5.1 5.3 Windows OS Windows OS Mac OS X 18

5.1 5.2 VirtualBox NAT 5.3 Mac OS X CPU 2.93GHz intel Core i7 16GB 1333MHz DDR3 OS Mac OS 10.6.6 5.1.5 Ubuntu Linux Ubuntu Linux 5.2 5.4 Windows OS Windows OS Ubuntu Linux[8] 5.4 Ubuntu Linux CPU Intel Core2Duo 2.40GHz 4GB 667MHz DDR2 OS Ubuntu 10.04 19

5.2 5.2 Mac OS X Ubuntu Linux HTTP OS Mac OS X Ubuntu Linux 5.3 LAN 2 OS OS HTTP 20

5.3 5.1 Mac OS X 21

5.3 5.2 Ubuntu Linux 22

5.3 5.3 Mac OS X 23

5.3 5.4 Ubuntu Linux 24

6 LAN LAN LAN LAN LAN 25

OB 26

[1] 21, p.1 2010 [2], 2009, R&D, 2009 [3], LAN IEEE 802.11i WPA,,2006/02/10. [4] Aboba, B., et al. Extensible Authentication Protocol(EAP). RFC 3748, June 2004. [5] T.Tsuji, A.Shimizu, A one-time password authentication method for low spec machines and on internet protocols, IEICE Trans.Commun., vol.e87-b, no.6, pp.1594-1600, 2004. [6],,, /,, 2008 [7], VirtualBox, http://www.virtualbox.org/. [8] Canonical Ltd. / Ubuntu Foundation, Ubuntu, http://www.ubuntu.com/. [9], ANHTTPD Server, http://www.st.rim.or.jp/ nakata/. 27