Search In this Thesis
   Search In this Thesis  
العنوان
Wireless Security /
المؤلف
Galal, Ayman Mohammed.
هيئة الاعداد
باحث / أيمن محمد جلال سند
مشرف / علي ابراهيم الدسوقي
مناقش / ‘براهيم السيد زيدان
مناقش / مفرح محمد سالم
الموضوع
Computer networks - Security measures. Wireless communication systems - Security measures.
تاريخ النشر
2005.
عدد الصفحات
127 p. :
اللغة
الإنجليزية
الدرجة
ماجستير
التخصص
هندسة النظم والتحكم
تاريخ الإجازة
01/01/2005
مكان الإجازة
جامعة المنصورة - كلية الهندسة - Department of computers and systems engineering
الفهرس
Only 14 pages are availabe for public view

from 157

from 157

Abstract

While wired LANs have wholly dominated the networking market, the last few years show a rise in wireless networking usage. This can best be seen in academic circles (i.e. University campuses), health­care, manufacturing, and warehousing. All the while, the technology is improving, making it easier and cheaper to companies to go wireless networks. Wireless networks are, by nature, much less secure than their more mature wired cousins. Because wireless NICs (Network Interface Cards) use the air as their data transport medium, they are vulnerable to unauthorized use and eavesDROPping. A network ?sniffer? could be used to monitor and steal network information with a heightened sense of ease versus a wired LAN. Without the need for a physical connection to access a wireless networks, they can be easily infiltrated. All the would­be hacker needs is a wireless NIC and knowledge of the current weaknesses of wireless network security to guide them. This thesis explains the most common ways of attacks in the wireless LAN and explain most techniques which have been used to protect Wireless LAN from these types of threats. One of these threats is for example War Driving is the most common type of threats on the wireless network But when we talk about enterprise solution the security solution will be completely different as the point of view changes. In the traditional security techniques the point of view concern with how to protect the wireless link between wireless parties by using different techniques like wired equivalency protocol (WEP). The WEP protocol relies on a secret key that is shared in a basic service set (BSS) which is a wireless Access Point(AP) and a set of associated nodes. This key is used to encrypt data packets before they are transmitted. The packets are also checked for integrity to ensure that they have not been modified in transit. In theory, the idea is that this protocol will protect wireless network privacy. As a secondary function, WEP is used to prevent unauthorized access to the wireless network. Analysis performed by several researchers has shown this protocol to fall short of these two fundamental goals as it will be shown in this thesis. Also there are others techniques used for security like MAC filtering , Temporal Key Integrity Protocol (TKIP) and 802.1X. But deploying enterprise security system for WLANs ,has different point of view which this thesis trying to explain by introducing an approach for wired and wireless networks for one level of security. This approach uses Kerberos and Lightweight Directory Access Protocol (LDAP) to build customized access point using Linux and Windows operation system which could be use to build enterprise Wireless ISP. In this case administration can be centralized which is the main demand on the enterprise applications.