To see the other types of publications on this topic, follow the link: Wireless LAN Security.

Dissertations / Theses on the topic 'Wireless LAN Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 42 dissertations / theses for your research on the topic 'Wireless LAN Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

McCarter, Harold Lars. "Analyzing Wireless LAN Security Overhead." Thesis, Virginia Tech, 2006. http://hdl.handle.net/10919/31789.

Full text
Abstract:
Wireless local area networks (WLAN) are beginning to play a much larger role in corporate network environments and are already very popular for home networking applications. This increase in accessibility has created large security holes for hackers and thieves to abuse, which is finally being addressed by stronger security methods such as advanced encryption algorithms and efficient authentication processes. However, these security methods often hamper network performance unbeknownst to engineers and users. This research examines the effects of Wired Equivalent Privacy (WEP), Temporal Key Integrity Protocol (TKIP), and Counter Mode/CBC-MAC Protocol (CCMP) encryption algorithms on throughput rates for IEEE 802.11 networks as well as the authentication times for Lightweight Extensible Authentication Protocol (LEAP) and Protected Extensible Authentication Protocol (PEAP). The research shows that todayâ s wireless hardware is capable of reducing overhead of even the most advanced encryption schemes to less than five percent of the total bandwidth.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
2

Schirninger, Rene, and Stefan Zeppetzauer. "Wireless On-Board Diagnostics." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-193.

Full text
Abstract:

Wireless On-board diagnostics functionality, which is a future outlook to vehicle system

parameter analysis, enables measurements and controlling without the limitation of a physical

connector. Today every vehicle must by law provide the possibility to analyze engine and

emission related parameters (OBD II). The wireless connection requires a high security level

to prevent unauthorized communication establishment with the truck’s bus system. The aim

of the project is to make a survey of the available security mechanisms and to find the most

promising solutions. Furthermore, several usage scenarios and access right levels are

specified and a risk analysis of the whole system is made. The greatest challenge is the

specification and implementation of a proper key-exchange mechanism between the analyzing

device and the truck’s bus system, which is therefore carried out with the highest possible

level of awareness. Consequently several different concepts have been formulated based on

the different usage scenarios.

APA, Harvard, Vancouver, ISO, and other styles
3

Skoglund, Johan. "Security of IEEE 802.11b." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1656.

Full text
Abstract:

The IEEE 802.11b standard is today the only commonly used standard in Europe for fast wireless networks. This makes it possible to connect computers to networks in places where it is not possible to use wires. Examples of such situations are internet access at airports, communication in emergency areas or for military communication. Common for all these situations is that network security is important.

This thesis consists of two different parts. The first part handles the security mechanisms and the second part is an evaluation of the possibilities to use IEEE 802.11b in embedded applications. The part that handles the security includes the security mechanisms found in the standard, flaws in these mechanisms and methods that try to reduce these problems.

APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Zhiguo. "Protecting 802.11-Based Wireless Networks From SCTS and JACK Attacks." ScholarWorks@UNO, 2008. http://scholarworks.uno.edu/td/862.

Full text
Abstract:
The convenience of IEEE 802.11-based wireless access networks has led to widespread deployment. However, these applications are predicated on the assumption of availability and confidentiality. Error-prone wireless networks afford an attacker considerable flexibility to exploit the vulnerabilities of 802.11-based mechanism. Two of most famous misbehaviors are selfish and malicious attacks. In this thesis we investigate two attacks: Spurious CTS attack (SCTS) and Jamming ACK attack (JACK). In the SCTS, malicious nodes may send periodic Spurious CTS packets to force other nodes to update their NAV values and prevent them from using the channel. In the JACK, an attacker ruins legitimate ACK packets for the intention of disrupting the traffic flow and draining the battery energy of victim nodes quickly. Correspondingly, we propose solutions: termed Carrier Sensing based Discarding (CSD), and Extended Network Allocation Vector (ENAV) scheme. We further demonstrate the performance of our proposed schemes through analysis and NS2 simulations.
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Bo. "XOR based optical encryption with noise performance modeling and application to image transmission over wireless IP lan." Thesis, Peninsula Technikon, 2004. http://hdl.handle.net/20.500.11838/1376.

Full text
Abstract:
Thesis (MTech (Information Technology))--Peninsula Technikon, 2004
Encryption was used whenever someone wanted to send a secret message to someone. The quality of the algorithm and key combination were the factors that ensured the strength of the system. However, until there were some automation one could not use complex methods for encryption because it simply took too long to encrypt and decrypt messages (even worse for images), manually. Optical technologies have recently been employed in encryption. Compared with traditional computer and electrical systems, optical technologies offer primarily two types of benefits, namely optical systems have an inherent capability for parallel processing, that is, rapid transmission of information, and information can be hidden in any of several dimensions, such as phase or spatial frequency. Optical systems therefore have an excellent capability for encoding information. In this project an image encryption technique was developed using exclusive-OR (XOR) operations in the optical domain before the captured image entered a digital computer network for further processing. A gray-level image of the object to be encrypted was converted a binary format and a pixel by pixel exclusive OR operation was performed on it with a random key-bit by making use of polarization encoding in LCD technology, before the encrypted binary image was detected by a CCD. The image may also be used as an input to a computer for comparison with a database. However, noise alters the encrypted bit and the value of the noisy encrypted bit is no longer binary. In this research the encryption techniques was evaluated and tested for applicability to encrypt and decrypt successfully. The noise performance was tested and compared. The technique was applied for image transmission over a wireless IP broadband link. Images (optical and thermal) captured from telemedicine application was transmitted and decrypted with reasonable success in this application.
APA, Harvard, Vancouver, ISO, and other styles
6

Mundi, Anuj V. "PLC-WiFi hybrid broadband Internet deployment and security /." [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0006964.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ozan, Orhan. "Denial of service attacks on 802.1X security protocol." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FOzan.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jaiaree, Thoetsak. "The security aspects of wireless local area network (WLAN)." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FJaiaree.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2003.
Thesis advisor(s): Norman F. Schneidewind, Douglas E. Brinkley. Includes bibliographical references (p. 75-78). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
9

Oh, Khoon Wee. "Wireless network security : design considerations for an enterprise network /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FOh.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lim, Yu-Xi. "Secure Geolocation for Wireless Indoor Networks." Thesis, Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11454.

Full text
Abstract:
The objective of the research is to develop an accurate system for indoor location estimation using a secure architecture based on the IEEE 802.11 standard for infrastructure networks. Elements of this secure architecture include: server-oriented platform for greater trust and manageability; multiple wireless network parameters for improved accuracy; and Support Vector Regression (SVR) for accurate, high-resolution estimates. While these elements have been investigated individually in earlier research, none has combined them to a single security-oriented system. Thus this research investigates the feasibility of using these elements together.
APA, Harvard, Vancouver, ISO, and other styles
11

Ng, Ching Yu. "Contributions to security in wireless ad-hoc networks." Access electronically, 2005. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060320.153622/index.html.

Full text
Abstract:
Thesis (M.Comp.Sc.)--University of Wollongong, 2005.
Typescript. This thesis is subject to a 6 month embargo (12/12/05 to 12/06/06) and may only be viewed and copied with the permission of the author. For further information please Contact the Archivist. Includes bibliographical references: leaf 65-72.
APA, Harvard, Vancouver, ISO, and other styles
12

Zeng, Kai. "Opportunistic Routing in Multihop Wireless Networks: Capacity, Energy Efficiency, and Security." Worcester, Mass. : Worcester Polytechnic Institute, 2008. http://www.wpi.edu/Pubs/ETD/Available/etd-072408-231438/.

Full text
Abstract:
Dissertation (Ph.D.)--Worcester Polytechnic Institute.
Keywords: opportunistic routing; security; energy efficiency; medium access control; capacity; throughput. Includes bibliographical references (leaves 192-201).
APA, Harvard, Vancouver, ISO, and other styles
13

Nandram, Winsome. "Information Security and Wireless : alternate approaches for controlling access to critical information /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FNandram.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Van, de Haar Paul. "Towards a wireless local area network security control framework for small, medium and micro enterprises in South Africa." Thesis, Nelson Mandela Metropolitan University, 2015. http://hdl.handle.net/10948/4001.

Full text
Abstract:
There is little literature available that is specific to the use of wireless local area network [WLAN) security among small, medium and micro enterprises (SMMEs) in South Africa. This research study developed a framework which may be used by SMMEs for the purposes of securing their WLANs. In view of the fact that the aim of the study was to develop a system for improving information technology security, the study followed a design science approach. A literature review was conducted on security control framework standards and WLAN technologies. The needs of SMMEs regarding WLANs were also established. The result of this process was an artefact in the form of a WLAN Security Control Framework for securing WLANs for SMMEs in South Africa. The suitability of the framework was validated by means of a focus group.
APA, Harvard, Vancouver, ISO, and other styles
15

Abdul, Halim Syafnidar. "Exploring wireless network security in Auckland City through warwalking a dissertation submitted to Auckland University of Technology in partial fulfillment of the requirements for the degree of Master of Computer and Information Sciences (MCIS), 2007." Abstract. Full dissertation, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Tan, Boon Hwee. "Defending IEEE 802.11-based networks against denial of service attacks /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FTan%5FB.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Lanning, Kevin E. "Wi-Fi Guest Access: A Struggle For Secure Functionality In Academic Environments." Thesis, School of Information and Library Science, 2007. http://hdl.handle.net/1901/375.

Full text
Abstract:
The rapid growth in the functionality of Wi-Fi networking in recent years has benefited academic environments. Consistent with their role as centers of innovation academic institutions have an interest in facilitating as much mobile, computer networking functionality as possible to parties of varying levels of affiliation, while also assuring confidentiality and integrity of communications. Providing secure yet functional Wi-Fi access to guests and affiliates in an academic environment presents significant challenges. Academic institutions have taken a wide variety of approaches to this problem. This study presents and analyzes data gathered from semi-structured telephone interviews with employees focused on computer networking and security in academic environments regarding their institutions’ approaches toward striking a balance between security and functionality. The results are summarized, conclusions are presented, and solutions to common problems are reviewed. Finally, remaining significant research questions are presented and explored.
APA, Harvard, Vancouver, ISO, and other styles
18

Stavroulakis, Georgios. "Rapidly deployable, self forming, wireless networks for maritime interdiction operations." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FStavroulakis.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2006.
Thesis Advisor(s): Alex Bordetsky. "September 2006." Includes bibliographical references (p. 79-81). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
19

Lakshmanan, Sriram. "Cooperative communication in wireless networks: algorithms, protocols and systems." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/42702.

Full text
Abstract:
Current wireless network solutions are based on a link abstraction where a single co-channel transmitter transmits in any time duration. This model severely limits the performance that can be obtained from the network. Being inherently an extension of a wired network model, this model is also incapable of handling the unique challenges that arise in a wireless medium. The prevailing theme of this research is to explore wireless link abstractions that incorporate the broadcast and space-time varying nature of the wireless channel. Recently, a new paradigm for wireless networks which uses the idea of 'cooperative transmissions' (CT) has garnered significant attention. Unlike current approaches where a single transmitter transmits at a time in any channel, with CT, multiple transmitters transmit concurrently after appropriately encoding their transmissions. While the physical layer mechanisms for CT have been well studied, the higher layer applicability of CT has been relatively unexplored. In this work, we show that when wireless links use CT, several network performance metrics such as aggregate throughput, security and spatial reuse can be improved significantly compared to the current state of the art. In this context, our first contribution is Aegis, a framework for securing wireless networks against eavesdropping which uses CT with intelligent scheduling and coding in Wireless Local Area networks. The second contribution is Symbiotic Coding, an approach to encode information such that successful reception is possible even upon collisions. The third contribution is Proteus, a routing protocol that improves aggregate throughput in multi-hop networks by leveraging CT to adapt the rate and range of links in a flow. Finally, we also explore the practical aspects of realizing CT using real systems.
APA, Harvard, Vancouver, ISO, and other styles
20

Abdullah, Hanifa. "A risk analysis and risk management methodology for mitigating wireless local area networks (WLANs) intrusion security risks." Diss., Pretoria : [s.n.], 2006. http://upetd.up.ac.za/thesis/available/etd-10122006-155850.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Martucci, Leonardo A. "Identity and anonymity in ad hoc networks /." Karlstad : Faculty of economic sciences, Communication and IT, Computer science, Karlstads universitet, Universitetstryckeriet), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-3981.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Chaabane, Adnen. "Propagation modeling of wireless systems in shipboard compartments." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FChaabane.pdf.

Full text
Abstract:
Thesis (M.S. in Electrical Engineering and M.S. in Systems Engineering)--Naval Postgraduate School, March 2005.
Thesis Advisor(s): David C. Jenn, Curt D. Schleher. Includes bibliographical references (p. 91-92). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
23

Kiani, Ghaffer I. (Ghaffer Iqbal). "Passive, active and absorbing frequency selective surfaces for wireless communication applications." Australia : Macquarie University, 2008. http://hdl.handle.net/1959.14/76611.

Full text
Abstract:
"March, 2009".
Thesis (PhD)--Macquarie University, Faculty of Science, Dept. of Physics & Engineering, 2008.
Bibliography: p. 145-158.
Introduction -- Frequency selective surfaces -- Absorb/transmit frequency selective surface absorber -- Switchable frequency selective surface for wireless applications -- Energy-saving glass characterisation -- Frequency selective surface solution for energy-saving glass -- Conclusion.
This thesis presents three topics related to frequency selective surfaces (FSSs), namely bsorb/transmit FSSs, active FSSs and passive bandpass FSSs for energy-saving glass used in modern buildings. These three FSSs are unique in their design and functionalities. The absorb/transmit FSS is a novel dual-layer frequency selective surface for 5 GHz WLAN applications. This FSS can stop propagation of specific bands by absorbing as opposed to re ecting, while passing other useful signals. This is in contrast to the conventional Salisbury and Jaumann absorbers, which provide good absorption in the desired band while the out-of-band frequencies are attenuated. The second topic is a single-layer bandpass active FSS that can be switched between ON and OFF states to control the transmission in 2.45 GHz WLAN applications. Previously, researchers have focused on the bandstop and dual-layer versions of the active FSS. This is in contrast to the design presented in this thesis which is single-layer and provides extra advantage in a practical WLAN environment. Also the dc biasing techniques that were used for the active FSS design are easier to implement and provide good frequency stability for different angles of incidence and polarisations in both ON and OFF states. The last topic is on the use of a bandpass FSS in energy-saving glass panels used in building design. The manufacturers of these glass panels apply a very thin metal-oxide coating on one side of the glass panels to provide extra infrared (heat) attenuation. However, due to the presence of the coating, these energy-saving glass panels also attenuate communication signals such as GSM 900, GSM 1800/1900, UMTS and 3G mobile signals etc. This creates a major communication problem when buildings are constructed with windows of this glass. In this thesis, a solution to this problem is presented by designing and etching a cross-dipole bandpass FSS on the coated side of the glass to pass the useful signals while keeping infrared attenuation at an acceptable level. One of the advantages of this FSS design is that measured material values of the metal-oxide coating are used for simulations, which have not been done previously.
Mode of access: World Wide Web.
166 p. ill. (some col.)
APA, Harvard, Vancouver, ISO, and other styles
24

Schmidt, Mark Bradley. "Development and analysis of a model for assessing perceived security threats and characteristics of innovating for wireless networks." Diss., Mississippi State : Mississippi State University, 2006. http://library.msstate.edu/etd/show.asp?etd=etd-04122006-130558.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Tabassum, Mujahid, and Khamees Elkhateeb. "Network Capability Analysis and Related Implementations Improvements Recommendations." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-2476.

Full text
Abstract:

The networking field has become a core component for any company. All of the

businesses rely on the networking industry, due its vastness and significance. Every day

companies are planning and thinking to develop better strategies that can offer efficient

and reliable communication solutions between their employees and customers for

maximum revenue. The planning of a company’s network requires a lot of resources and

aspects to study, and to evaluate them carefully to build a comprehensive secure and

reliable platform. It is the job of a network administrator to take care of the company’s

network infrastructure and upgrade or update the required components and applications

from time-to-time that can follow new standards.

This thesis is a practical work aimed to evaluate a company network infrastructure in its

real environment. The purpose of this thesis is to evaluate different aspects of the

network infrastructure used such as VPN, WLAN, firewall and physical security and give

recommendations to make their performance better and to offer more advanced strategies.

This study will also provide an inclusive observation of the company’s needs and their

network infrastructure, and will provide a concept how to evaluate and fix small mistakes,

the kind of problems that can occur in an evolving company network. Lastly, this research

will make recommendations and suggest a possible implementation on the studied

network infrastructure.

APA, Harvard, Vancouver, ISO, and other styles
26

Onder, Hulusi. "Session hijacking attacks in wireless local area networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FOnder.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

"Wireless LAN security." 2005. http://library.cuhk.edu.hk/record=b5892644.

Full text
Abstract:
Chan Pak To Patrick.
Thesis (M.Phil.)--Chinese University of Hong Kong, 2005.
Includes bibliographical references (leaves 82-86).
Abstracts in English and Chinese.
Abstract --- p.i
Acknowledgement --- p.iii
Contents --- p.iv
List of Figures --- p.vii
List of Tables --- p.viii
Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Motivation --- p.1
Chapter 1.2 --- The Problems --- p.3
Chapter 1.3 --- My Contribution --- p.4
Chapter 1.4 --- Thesis Organization --- p.5
Chapter 2 --- Wireless LAN Security Model --- p.6
Chapter 2.1 --- Preliminary Definitions on WLAN --- p.6
Chapter 2.2 --- Security Model --- p.7
Chapter 2.2.1 --- Security Attributes --- p.7
Chapter 2.2.2 --- Security Threats in WLAN --- p.8
Chapter 2.2.3 --- Attacks on Authentication Scheme --- p.10
Chapter 2.2.4 --- Attacks on Keys --- p.10
Chapter 2.3 --- Desired Properties of WLAN Authentication --- p.11
Chapter 2.3.1 --- Security Requirements of WLAN Authentication --- p.11
Chapter 2.3.2 --- Security Requirements of Session Keys --- p.12
Chapter 2.3.3 --- Other Desired Properties of WLAN Authentication --- p.12
Chapter 3 --- Cryptography --- p.14
Chapter 3.1 --- Overview on Cryptography --- p.14
Chapter 3.2 --- Symmetric-key Encryption --- p.15
Chapter 3.2.1 --- Data Encryption Standard (DES) --- p.15
Chapter 3.2.2 --- Advanced Encryption Standard (AES) --- p.15
Chapter 3.2.3 --- RC4 --- p.16
Chapter 3.3 --- Public-key Cryptography --- p.16
Chapter 3.3.1 --- RSA Problem and Related Encryption Schemes --- p.17
Chapter 3.3.2 --- Discrete Logarithm Problem and Related Encryption Schemes --- p.18
Chapter 3.3.3 --- Elliptic Curve Cryptosystems --- p.19
Chapter 3.3.4 --- Digital Signature --- p.19
Chapter 3.4 --- Public Key Infrastructure --- p.20
Chapter 3.5 --- Hash Functions and Message Authentication Code --- p.21
Chapter 3.5.1 --- SHA-256 --- p.22
Chapter 3.5.2 --- Message Authentication Code --- p.22
Chapter 3.6 --- Entity Authentication --- p.23
Chapter 3.6.1 --- ISO/IEC 9798-4 Three-pass Mutual --- p.23
Chapter 3.6.2 --- ISO/IEC 9798-4 One-pass Unilateral --- p.24
Chapter 3.7 --- Key Establishment --- p.24
Chapter 3.7.1 --- Diffie-Hellman Key Exchange --- p.24
Chapter 3.7.2 --- Station-to-Station Protocol --- p.25
Chapter 3.8 --- Identity-Based Cryptography --- p.25
Chapter 3.8.1 --- The Boneh-Franklin Encryption Scheme --- p.26
Chapter 3.8.2 --- Au and Wei's Identification Scheme and Signature Scheme --- p.27
Chapter 4 --- Basics of WLAN Security and WEP --- p.29
Chapter 4.1 --- Basics of WLAN Security --- p.29
Chapter 4.1.1 --- "Overview on ""Old"" WLAN Security" --- p.29
Chapter 4.1.2 --- Some Basic Security Measures --- p.29
Chapter 4.1.3 --- Virtual Private Network (VPN) --- p.30
Chapter 4.2 --- WEP --- p.31
Chapter 4.2.1 --- Overview on Wired Equivalent Privacy (WEP) --- p.31
Chapter 4.2.2 --- Security Analysis on WEP --- p.33
Chapter 5 --- IEEE 802.11i --- p.38
Chapter 5.1 --- Overview on IEEE 802.11i and RSN --- p.38
Chapter 5.2 --- IEEE 802.1X Access Control in IEEE 802.11i --- p.39
Chapter 5.2.1 --- Participants --- p.39
Chapter 5.2.2 --- Port-based Access Control --- p.40
Chapter 5.2.3 --- EAP and EAPOL --- p.40
Chapter 5.2.4 --- RADIUS --- p.41
Chapter 5.2.5 --- Authentication Message Exchange --- p.41
Chapter 5.2.6 --- Security Analysis --- p.41
Chapter 5.3 --- RSN Key Management --- p.43
Chapter 5.3.1 --- RSN Pairwise Key Hierarchy --- p.43
Chapter 5.3.2 --- RSN Group Key Hierarchy --- p.43
Chapter 5.3.3 --- Four-way Handshake and Group Key Handshake --- p.44
Chapter 5.4 --- RSN Encryption and Data Integrity --- p.45
Chapter 5.4.1 --- TKIP --- p.45
Chapter 5.4.2 --- CCMP --- p.46
Chapter 5.5 --- Upper Layer Authentication Protocols --- p.47
Chapter 5.5.1 --- Overview on the Upper Layer Authentication --- p.47
Chapter 5.5.2 --- EAP-TLS --- p.48
Chapter 5.5.3 --- Other Popular ULA Protocols --- p.50
Chapter 6 --- Proposed IEEE 802.11i Authentication Scheme --- p.52
Chapter 6.1 --- Proposed Protocol --- p.52
Chapter 6.1.1 --- Overview --- p.52
Chapter 6.1.2 --- The AUTHENTICATE Protocol --- p.56
Chapter 6.1.3 --- The RECONNECT Protocol --- p.59
Chapter 6.1.4 --- Packet Format --- p.61
Chapter 6.1.5 --- Ciphersuites Negotiation --- p.64
Chapter 6.1.6 --- Delegation --- p.64
Chapter 6.1.7 --- Identity Privacy --- p.68
Chapter 6.2 --- Security Considerations --- p.68
Chapter 6.2.1 --- Security of the AUTHENTICATE protocol --- p.68
Chapter 6.2.2 --- Security of the RECONNECT protocol --- p.69
Chapter 6.2.3 --- Security of Key Derivation --- p.70
Chapter 6.2.4 --- EAP Security Claims and EAP Methods Requirements --- p.72
Chapter 6.3 --- Efficiency Analysis --- p.76
Chapter 6.3.1 --- Overview --- p.76
Chapter 6.3.2 --- Bandwidth Performance --- p.76
Chapter 6.3.3 --- Computation Speed --- p.76
Chapter 7 --- Conclusion --- p.79
Chapter 7.1 --- Summary --- p.79
Chapter 7.2 --- Future Work --- p.80
Bibliography --- p.82
APA, Harvard, Vancouver, ISO, and other styles
28

Sung, Hsieh Chih, and 謝志松. "Wireless LAN Security Guide of Study." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/72141812041243127113.

Full text
Abstract:
碩士
國立臺灣科技大學
資訊管理系
93
The WLANs is more and more popular in the Internet environment, since it is the very convenient network. Following this trend, the security of WLAN is also more and more important, causing that the information security society is focusing on the WLANs security right now. According to the statistics in the Taiwan government, about 60% Taiwan WLANs user don’t consider the security issue. Also many intruding events in the WLANs network happened in the last year. These things cause the personnel and company information security is more and more serious, so I want to develop a security standard to provide them to refer. For this standard, I begin from studying some document, and then analyze WLANs security mechanism, management operation, security technology, and security requirement. After thinking and concluding some results, I establish the WLANs network security standard and also build up the self-examination list. This list can guide the government and personnel to install a security environment or to be a reference. Finally the practicability of the WLANs network security standard is discussed. I adopt the requirement of the mobile office network as my model, and use threat analysis, security police and security structure to build up the self-examination list.
APA, Harvard, Vancouver, ISO, and other styles
29

Ting, Kuo-Shu, and 丁國書. "The STUDY OF WIRELESS LAN SECURITY IN HOSPITALS." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/25371047111997411645.

Full text
Abstract:
碩士
嶺東科技大學
資訊科技應用研究所
102
Compare Wireless LAN with traditional network,Wireless network is relataively easy to install and having mobility. As the technology development, Wireless network equipment into the mainstream market. The paper analyzes the existing hospital wireless network security. Try to put forward an authentication method with sufficient strength. And reference building wireless networks. In this paper, we use the Das’s theory in 2004, “A verification method using a dynamic ID”. We use smart phones to replace the traditional smart card to anonymous authentication. According to our research results, anonymous authentication can provide enough safety and easy to apply the wireless network in hospitals.
APA, Harvard, Vancouver, ISO, and other styles
30

Jen-Pin, Peng, and 彭仁賓. "The Study of Security Auditing Model for Wireless LAN." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/18379954461856213191.

Full text
Abstract:
碩士
長庚大學
資訊管理研究所
94
While the wireless networks have been widely used by the public, the security becomes the most important issue for network administrators. Therefore, various security mechanisms, such as firewalls, Intrusion Detection System (IDS) and system authentication, have to be built. However, as the intrusions and attacks nowadays are changed with each passing day, the objective of this research is to build a security auditing model, which provides network administrators the basis to correct and adjust related security settings in order to maintain the wireless network security of the corporation. In this research, we focus on the study of the security issues of IEEE 802.11 Wireless LAN (WLAN). Based on the current WLAN architecture, we make use of 2-phase risk analysis model. In the first phase, we define various risk factors, and make the evaluation table, which is evaluated by the auditor. In the second phase, by referring to the BS7799 standard, the improvement suggestion for the high-risk items of the first phase will be provided. Finally, the suitable plan of information security management will be made from the complete standards. According to this proposed model, we do case studies, analyze the results, and then develop a complete security system. The goal of this research is to develop a security auditing model for WLAN to enhance the information security management system (ISMS) of WLAN, and propose a feasible standard model for administrators and auditors.
APA, Harvard, Vancouver, ISO, and other styles
31

Tzu, Chu-Tai, and 資楚台. "The Wireless LAN Study of Security-A case for WEP." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/19972077779248966425.

Full text
Abstract:
碩士
中國文化大學
資訊管理研究所碩士在職專班
96
There are many design flaws confirmed in Wired Equivalent Privacy (WEP) pro-tocol used in Wireless Local Area Network (WLAN) for encryption transmission. To solve the security weakness in WEP, the Temporal Key Integrity Protocol (TKIP) is proposed. However, in addition to containing security weaknesses, the transmission performance of TKIP is lower than that of WEP. A new protocol, Secure Enhanced Wireless Transfer Protocol (SEWTP), is further proposed to improve the problems found in WEP and TKIP. Unfortunately, SEWTP uses a short initial random number. When the corresponding initial random numbers in two different communications are the same, the keystreams in the corresponding communications will also be the same, causing the keystream reuse risk. Once the keystream is reused in two different com-munications, a large amount of encrypted transmitted information will leak. This thesis analyzes the security flaw in SEWTP, discusses the reasons behind its security flaw, and designs an improved new protocol. The proposed new protocol not only maintains the transmission performance of WEP but also solves the security prob-lems found in WEP, TKIP, and SEWTP designed for WLAN.
APA, Harvard, Vancouver, ISO, and other styles
32

Na, Chen. "IEEE 802.11 wireless LAN traffic analysis: a cross-layer approach." Thesis, 2005. http://hdl.handle.net/2152/1641.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Yu, Kuo Yung, and 郭永裕. "Constructing the Matching Model of Wireless LAN Security Solution in Different Environments." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/49904448287037231256.

Full text
Abstract:
碩士
輔仁大學
資訊管理學系
98
With the popularity of WLAN, information security has become a hot topic. In order to protect the safety of WLAN, enterprises and individual users take the corresponding security measures. Based on the degree of attention on the safety, security modes are also somewhat different with protection level. If people employ an inappropriate security mode, then it will increase security risk or unnecessary waste of resources. In the past, there has been little academic research on the relations of security mode and the application environment. Therefore, the purpose of this study was to establish an applicable matching model, provided by such matching relationship to the current and future users for an appropriate security mode selection. This study used a case study method. Firstly, after surveying the related literature for the WLAN security risks when people in use, specifying for the different characteristics of each security solution, the study defined the different application environments for WLAN. Then, a relationship matching model between the security solution and application environment was proposed. In this study, there are three different types of cases which including SOHO, organization, and public area. With the case study of WLAN security solutions at the actual situation usage, the study also demonstrated the effectiveness of the proposed model. The results showed that the actual implementation of these cases and the proposed matching model are quite consistent. Therefore, this study indicated a high degree of effectiveness of matching model. Among the main application environments, the SOHO which containing simple organizations are applicable to the simple program of this study, the complex organizations are applicable to the complex program and the public areas are applicable to the UAM (Universal Access Method) program.
APA, Harvard, Vancouver, ISO, and other styles
34

HSU, CHIEN-HAO, and 許乾豪. "Security Architecture Design of the Wireless LAN with the Multi-site Intranet." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/19121124398819647399.

Full text
Abstract:
碩士
國立中央大學
資訊管理學系碩士在職專班
91
With the popularity of wireless networking, more and more enterprises intend to integrate wireless LAN with the Intranet. However, as the wireless LAN is weak in security, it becomes the misgivings when the enterprises try to assess it. Since the new standard of the wireless LAN, such as 802.11i is still under development, the suppliers of networking equipment provide different solutions with different security technologies. This situation makes enterprises have no standard to follow and thus becomes an obstacle of build-in into wireless LAN. On the other hand, Although most current securities focus on the single enterprise networking, some enterprises use the architecture of the multi-site in reality. With respect the WLAN security, there are not too many solutions for the topology of the multi-site. To solve this problem, in thesis we focuses on WLAN security problem of multi-site enterprise networking. We propose various security architectures of the wireless LAN for the enterprise Intranet by using the current securities and technologies with networking topology and networking communication arrangements. We also analysis the advantages and disadvantages of multi-site from different sides. Furthermore, we provide a tool to select the security architecture of wireless LAN and explain by three realistic cases. The tool also can provide the suggestion of the security architecture of wireless LAN and help networking planers making the applicable security decisions.
APA, Harvard, Vancouver, ISO, and other styles
35

Vu, Hai Trong. "Improving security services for wireless networks /." 2009. http://proquest.umi.com/pqdweb?did=1899567111&sid=5&Fmt=2&clientId=10361&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Cubukcu, Ilkay Yasinsac Alec. "Formally evaluating wireless security protocols." Diss., 2005. http://etd.lib.fsu.edu/theses/available/etd-04092005-170554.

Full text
Abstract:
Thesis (M.S.)--Florida State University, 2005.
Advisor: Dr. Alec Yasinsac, Florida State University, College of Arts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed June 7, 2005). Document formatted into pages; contains x, 149 pages. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
37

Billapati, Venkata R. Foo Simon Y. "Security in wireless communications and wireless local area networks." 2004. http://etd.lib.fsu.edu/theses/available/etd-07172004-104054.

Full text
Abstract:
Thesis (M.S.)--Florida State University, 2004.
Advisor: Dr. Simon Foo, Florida State University, College Engineering, Dept. of Electrical and Computer Engineering. Title and description from dissertation home page (viewed Sept. 29, 2004). Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
38

Diakite, Soumaila Dit Moule. "WISP: a wireless information security portal." Thesis, 2010. http://hdl.handle.net/10210/3060.

Full text
Abstract:
M.Sc.
Wireless networking is a fairly new technology that is important in information technology (IT). Hotels, Airports, Coffee shops, and homes are all installing wireless networks at a record pace, making wireless networks the best choice for consumers. This popularity of wireless networks is because of the affordability of wireless networks devices, and the easy installation [11]. In spite of the popularity of the wireless networks, one factor that has prevented them from being even more widespread can be summed up in a single word: security. It comes as no surprise that these two – wireless and security – converge to create one of the most important topics in the IT industry today [11]. Wireless networks by nature bring about new challenges unique to its environment. One example of these new challenges is: “Signal overflow beyond physical walls”, and with these kinds of new challenges unique to wireless networks, we have new security risks. Hence wireless networks lend themselves to a host of attack possibilities and risks. That is because wireless networks provide a convenient network access point for an attacker, potentially beyond the physical security controls of the organization [7]. Therefore it is challenging for managers to introduce wireless networks and properly manage the security of wireless networks, Security problems of wireless networks are the main reason for wireless networks not being rolled out optimally [1]. In this dissertation, we aim to present to both specialist and non–specialists in the IT industry the information needed to protect a wireless network. We will first identify and discuss the different security requirements of wireless networks. After that we shall examine the technology that helps make wireless networks secure, and describe the type of attacks against wireless networks and defense techniques to secure wireless networks. The research will concentrate on wireless LANs (Local Area Networks), and leading wireless LAN protocols and standards. The result of the research will be used to create WISP (A Wireless Information Security Portal). WISP will be a tool to support the management of a secure wireless network, and help assure the confidentiality, integrity, and availability of the information systems in a wireless network environment.
APA, Harvard, Vancouver, ISO, and other styles
39

CHANG, REAY-LIN, and 張瑞麟. "An Enhanced Key Generation and Roaming Security for Wireless LANs." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/25768983676244007979.

Full text
Abstract:
碩士
國立中興大學
電機工程學系
91
The 802.1X and 802.11i were proposed to resolve some problems in 802.11. However, the 802.1x still has some drawbacks and could be hijacked through middle of communication session. The main problems in the wireless LANs security standards are the key distribution and mutual authentication between the supplicant and the access point (AP)[1][2]. The same character of all personal digital devices is mobility. 802.11f draft provides IAPP for used by roaming. In this thesis, we propose a secure channel for regular communication and roaming security and a security key exchange scheme, one time session key generation protocol (OTSKGP) to avoid being hijacked. The prime purpose is to create a secure channel between supplicant and AP. The supplicant and AP compute their session key individually. This scheme includes three phases and all the steps of the phases are protected by public-key encryption. Therefore no information can be hijacked between supplicant and server or between AP and server. Besides, we propose a new secure roaming which is using the OTSKGP.
APA, Harvard, Vancouver, ISO, and other styles
40

"Trust- and clustering-based authentication service in MANET." 2004. http://library.cuhk.edu.hk/record=b5892241.

Full text
Abstract:
Ngai Cheuk Han.
Thesis (M.Phil.)--Chinese University of Hong Kong, 2004.
Includes bibliographical references (leaves 110-117).
Abstracts in English and Chinese.
Abstract --- p.i
Acknowledgement --- p.iv
Chapter 1 --- Introduction --- p.1
Chapter 2 --- Background Study --- p.5
Chapter 2.1 --- Mobile Ad Hoc Networks --- p.5
Chapter 2.1.1 --- Definition --- p.5
Chapter 2.1.2 --- Characteristics --- p.5
Chapter 2.1.3 --- Applications --- p.6
Chapter 2.1.4 --- Standards --- p.7
Chapter 2.1.5 --- Routing Protocols --- p.8
Chapter 2.2 --- Security in Mobile Ad Hoc Networks --- p.11
Chapter 2.2.1 --- Vulnerabilities --- p.11
Chapter 2.2.2 --- Motivation for the Attacks --- p.12
Chapter 2.2.3 --- Types of Attacks --- p.13
Chapter 2.3 --- Cryptography --- p.13
Chapter 2.3.1 --- Cryptographic goals --- p.13
Chapter 2.3.2 --- Symmetric-key encryption --- p.14
Chapter 2.3.3 --- Asymmetric-key encryption --- p.14
Chapter 2.3.4 --- Digital Signatures --- p.15
Chapter 2.3.5 --- Digital Certificates --- p.15
Chapter 2.3.6 --- Certificate Authority --- p.16
Chapter 2.4 --- Literature Review --- p.17
Chapter 3 --- Related Work --- p.23
Chapter 4 --- Architecture and Models --- p.26
Chapter 4.1 --- Architecture of the Authentication Service --- p.26
Chapter 4.2 --- The Network Model --- p.28
Chapter 4.2.1 --- Clustering-Based Structure --- p.31
Chapter 4.2.2 --- Clusterhead Selection Criteria and Role --- p.33
Chapter 4.3 --- The Trust Model --- p.37
Chapter 4.3.1 --- Direct TVust --- p.40
Chapter 4.3.2 --- Recommendation Trust --- p.41
Chapter 4.3.3 --- Deriving Direct Trust --- p.41
Chapter 5 --- Trust- and Clustering-Based Authentication Service --- p.43
Chapter 5.1 --- Clustering Structure Formation and Maintenance --- p.43
Chapter 5.1.1 --- Clustering Structure Formation --- p.43
Chapter 5.1.2 --- Network Maintenance --- p.45
Chapter 5.2 --- Security Operations --- p.50
Chapter 5.2.1 --- Public Key Certification --- p.51
Chapter 5.2.2 --- Identification of Malicious Nodes --- p.55
Chapter 5.2.3 --- Trust Value Update --- p.58
Chapter 5.3 --- Special Scenarios --- p.60
Chapter 5.3.1 --- Join the network --- p.60
Chapter 5.3.2 --- Move to another cluster --- p.61
Chapter 5.3.3 --- Not Enough Introducer --- p.62
Chapter 6 --- Simulations and Results --- p.65
Chapter 6.1 --- Authentication Service Based on Trust and Network Mod- els --- p.65
Chapter 6.1.1 --- Experiments Set-Up --- p.65
Chapter 6.1.2 --- Simulation Results --- p.67
Chapter 6.2 --- Clusters Formation and Maintenance --- p.85
Chapter 6.2.1 --- Experiments Set-Up --- p.85
Chapter 6.2.2 --- Simulation Results --- p.86
Chapter 6.3 --- Authentication Service Based on Trust and Network Mod- els with Clusters Formation and Maintenance --- p.91
Chapter 6.3.1 --- Experiments Set-Up --- p.91
Chapter 6.3.2 --- Simulation Results --- p.94
Chapter 7 --- Conclusion --- p.108
Bibliography --- p.117
APA, Harvard, Vancouver, ISO, and other styles
41

Turnbull, Benjamin. "Wi-Fi as electronic evidence : policy, process and tools." 2007. http://arrow.unisa.edu.au:8081/1959.8/80697.

Full text
Abstract:
802.11-based wireless networking has invaded cities, offices, homes and coffee shops over the last five years, and has become a widely used and accepted technology. It has revolutionised computer networking and automation and added a social aspect to personal computing. Accompanying this widespread usage is the presence of crime; the more popular technology, the more opportunity exists for its misuse.
This dissertation studied 802.11-based wireless networking environment from a forensic computing perspective. It sought to understand the current state of wireless misuse: present misuses; potential forms of misuse involving 802.11-based wireless networks; and current tools and techniques used in its identification, containment and analysis. The research highlights the lack of current tools and procedures for forensic computing investigations that are able to effectively handle the presence of wireless devices and networks, and that there are forms of misuse that may escape detection by forensic investigation teams. This work was then developed into a taxonomy of wireless misuse.
Once the current state was known, this research sought to readdress the current state of forensic computing teams, through analysing the need for software tools and procedural changes to counter the misuses that this technology allows. Once software outcomes were developed, the legal and technical feasibility of their use was ascertained. Based on the outcomes of this work, a final set of software requirements was developed and the proposed methodology for their development was discussed.
A new series of procedures was also developed for forensic investigators to identify, contain and analyse sources of electronic evidence with 802.11-networking. Much of this work was based upon but extending current procedural guides for law enforcement.
The final outcome of this research was the development of a series of recommendations for forensic teams and research that incorporates short, medium and long term development for forensic teams as well as research and development. This work intended to provide mechanisms for future research that are jurisdictionally independent able to be adapted for each individual forensic team. The short term recommendations were primarily changes to procedure, whereas the medium and long terms changes sought to address the larger issues raised by wireless networking devices being the target of or involved in crime or misuse.
Much of this dissertation is exploratory in nature and much of its length is devoted to determining the current state of the misuse and current mechanisms employed to counter it. In such a rapidly developing field of study, this work will need constant revision as new technologies emerge and new forms of misuse take advantage of them.
Thesis (PhDInformationTechnology)--University of South Australia, 2007
APA, Harvard, Vancouver, ISO, and other styles
42

Zare, Afifi Saharnaz. "Securing sensor network." Thesis, 2014. http://hdl.handle.net/1805/6186.

Full text
Abstract:
Indiana University-Purdue University Indianapolis (IUPUI)
A wireless sensor network consists of lightweight nodes with a limited power source. They can be used in a variety of environments, especially in environments for which it is impossible to utilize a wired network. They are easy/fast to deploy. Nodes collect data and send it to a processing center (base station) to be analyzed, in order to detect an event and/or determine information/characteristics of the environment. The challenges for securing a sensor network are numerous. Nodes in this network have a limited amount of power, therefore they could be faulty because of a lack of battery power and broadcast faulty information to the network. Moreover, nodes in this network could be prone to different attacks from an adversary who tries to eavesdrop, modify or repeat the data which is collected by other nodes. Nodes may be mobile. There is no possibility of having a fixed infrastructure. Because of the importance of extracting information from the data collected by the sensors in the network there needs to be some level of security to provide trustworthy information. The goal of this thesis is to organize part of the network in an energy efficient manner in order to produce a suitable amount of integrity/security. By making nodes monitor each other in small organized clusters we increase security with a minimal energy cost. To increase the security of the network we use cryptographic techniques such as: public/ private key, manufacturer signature, cluster signature, etc. In addition, nodes monitor each other's activity in the network, we call it a "neighborhood watch" In this case, if a node does not forward data, or modifies it, and other nodes which are in their transmission range can send a claim against that node.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography