• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 10
  • 8
  • 8
  • 7
  • 6
  • 6
  • 6
  • 6
  • 5
  • 4
  • 3
  • 3
  • 3
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Bezpečnostní analýza bezdrátových sítí / Wireless networks security analysis

Szőcs, Juraj January 2010 (has links)
This master’s thesis deals with analysis of security in wireless networks. There are desc- ribed various methods of security systems, such as WEP, TKIP and CCMP. There is also realization of attacks against the wireless network and there is analysis of security weaknesses. Then there are discussed possible defense mechanisms. Part of this work was also analysis of local security in certain areas and evaluation of their security.
2

Analýza šifrovacích algoritmů ve standardu 802.11 / Analysis of Cryptographic Algorithms 802.11

Vojtíšek, Jindřich January 2014 (has links)
This work deals with wireless standard 802.11, primaly about security algorithms used in them. Further there is made analysis of algorithms WEP, WPA and WPA2. This algorithms are described how coding by them works and for easier understandig are added block schemes of their principles. In practical part is realized algorithms WEP, WPA and WPA2 in program Matlab simulink. Model is complemented by graphs which shows how data changes when comming throught this systems.
3

Security and Authentication for 802.11 Wireless Networks

Getraide, Michel 21 May 2004 (has links)
Wireless Networks is a very growing market. However, the security measures are not strong enough; the WEP security protocol is flawed. The 802.11 Task Group I is working on new security measures in order to strengthen the access control of users, the privacy and the integrity of data. We will describe the WEP flaws and the new security measures of 802.11 Task Group I. Finally, we will propose a new architecture to improve user identification for the wireless network of our department.
4

Zabezpečení bezdrátových sítí IEEE 802.11 / Security of wireless computer networks IEEE 802.11

Škodák, Jaroslav January 2008 (has links)
This work describes available and used standards, protocols and mechanisms used to secure IEEE 802.11 wireless networks. In the next section are listed vulnerabilities and possible attacks against different types of security. The principles of individual attacks on authentication, WEP security and WPA/WPA2 personal mode are described and realized using various software especially linux program aircrack-ng. Password for WEP security is obtained by passive eavesdropping data, using ARP replay injection and by creating own frames. The last two methods are used to generate traffic on the network, which is captured and then used to derive the WEP password. By injecting ARP frames, password was found in the number 60 000 captured frames and about 180 000 frames of data was needed for passive method. Decryption of WEP frame was done by fragment and KoreK chopchop attacks. This decrypted frame could be used to create fake frames and obtain WEP password. Brute force attack is realized for security WPA (WPA2) personal mode (often due to lack of strong password) by comparing password (passphrase) from password list. Speed of comparing is about 200 passwords/s.
5

Analyzing Wireless LAN Security Overhead

McCarter, Harold Lars 16 May 2006 (has links)
Wireless local area networks (WLAN) are beginning to play a much larger role in corporate network environments and are already very popular for home networking applications. This increase in accessibility has created large security holes for hackers and thieves to abuse, which is finally being addressed by stronger security methods such as advanced encryption algorithms and efficient authentication processes. However, these security methods often hamper network performance unbeknownst to engineers and users. This research examines the effects of Wired Equivalent Privacy (WEP), Temporal Key Integrity Protocol (TKIP), and Counter Mode/CBC-MAC Protocol (CCMP) encryption algorithms on throughput rates for IEEE 802.11 networks as well as the authentication times for Lightweight Extensible Authentication Protocol (LEAP) and Protected Extensible Authentication Protocol (PEAP). The research shows that today's wireless hardware is capable of reducing overhead of even the most advanced encryption schemes to less than five percent of the total bandwidth. / Master of Science
6

An?lise do desempenho de WLAN com a implementa??o dos protocolos de seguran?a WEP e WPA/TKIP / Performance analysis of WLAN with the implementation of WEP and WPA/TKIP security protocols

Carvalho Filho, Manoel Peluso de 24 November 2008 (has links)
Made available in DSpace on 2016-04-04T18:31:27Z (GMT). No. of bitstreams: 1 Manoel Peluso de Carvalho Filho.pdf: 1548469 bytes, checksum: 813f063c4ea17788aa795465c9e6e6f5 (MD5) Previous issue date: 2008-11-24 / Nowadays, the use of the wireless network technology has grown mainly motivated by the price of equipments, ease of installation, network maintenance and expansion of technical safety. The more you use the wireless network resource, the better should be the treatment related to its safety aspect. As the security level increases, the amount of information transmitted between the equipment decreases. This thesis aims to analyze the performance of WLAN network with the implementation of WEP and WPA / TKIP security protocols in an environment that uses applications whose characteristic is to generate small packets on the network. The LanTraffic TM software is used to generate traffic and also to capture the transmission rate in Kbps that flows through the stations. Three scenarios are simulated varying in the distance between the equipments. For each scenario, a comparative study was made and the WLAN behavior without the security resource analyzed, then it was analyzed with the WEP fitted and finally with the WPA/TKIP configured. To develop the experiments it was used a WLAN network in a controlled environment in the Laboratory Research on Radio System in PUC Campinas. Therefore, there is not external interference in the signal transmitted by equipments. / A utiliza??o da tecnologia de rede sem fio tem crescido ultimamente motivado principalmente pelo pre?o dos equipamentos, facilidade de instala??o, manuten??o da rede e amplia??o das t?cnicas de seguran?a. Quanto mais se utiliza o recurso de rede sem fio maior tem de ser o tratamento em rela??o ao aspecto de seguran?a. A medida que aumenta o n?vel de seguran?a, decresce a quantidade de informa??o transmitida entre os equipamentos. Esse trabalho visa analisar o desempenho de rede WLAN(Wireless Local ?rea Network) com a implementa??o dos protocolos de seguran?a WEP(Wired Equivalent Privacy) e WPA/TKIP(WI-FI Protected Access / Temporal Key Integrity Protocol). ? utilizado o software LanTrafficTM para gerar tr?fego na rede e tamb?m para capturar a taxa de transmiss?o em Kbps trafegados entre as STAs. S?o emulados tr?s cen?rios variando a dist?ncia entre os equipamentos. Para cada cen?rio foi confeccionado um comparativo e analisado o comportamento da WLAN configurado sem seguran?a, com o WEP habilitado e finalmente com o WPA/TKIP configurado. Para executar os experimentos utilizou-se uma rede WLAN no laborat?rio de pesquisa em sistema de r?dio (LP-SiRa) da PUC Campinas em um ambiente controlado. Com isso n?o h? interfer?ncias na transmiss?o dos sinais emitidos pelos equipamentos Ou seja, sem interfer?ncia externa no sinal transmitido entre os equipamentos.
7

Wireless-LAN im Studentennetzwerk (CSN)

Glöckner, Alexander 02 April 2006 (has links) (PDF)
Inhalt der Diplomarbeit sind Untersuchungen zur Authentifizierung und Verschlüsselung von drahtlosen Netzwerkverbindungen.
8

Bezpečnost bezdrátových počítačových sítí / Security of wireless computer networks

Jelínek, Martin January 2010 (has links)
The master's thesis deals with the issue of Wireless Local Area Network (WLAN) from the viewpoint of the security and functional principle of security mechanisms. The transition to the issue concerning the security is accompanied by the methods of wireless data transmission operating on the level of physical layer (FHSS, DSSS, OFDM, MIMO), which is followed by the summary of individual 802.11 standards. The next part deals with the issue of shared transmission medium (CSMA/CA), influence of interference and correcting mechanisms (RTS/CTS). Within the security, the principles of the authentication along with the commonly used methods of security (WEP, WPA, WPA2) are described in detail. The first part concerning security deals with the security in the form of the WEP protocol, which is considered insufficient nowadays and points out the imperfect implementation and the consequent risks. The following part describes the security in the form of WPA which eliminates the implementation weaknesses of the previous WEP security protocol. The description of commonly used mechanisms of authentication (PSK, 802.1x), required temporary key management (PTK, GTK), data integrity (MIC) and encryption which uses TKIP protocol are also included. The last part, possible WLAN security, is aimed at the full support of 802.11i standard, which is called WPA2 (sometimes RSN). That part describes the basic encryption security element CCMP, which is based on the AES block cipher modes. The practical part of the thesis deals with the security verification of current wireless networks. In the process of verification the accessible HW means and programming tools of Open Source Software (OSS) are used. By means of verification it has been pointed out that there are possible security risks resulting from the security method which has been used. Also several recommendations how to reduce the security risks of the used method to minimum are mentioned.
9

Wireless-LAN im Studentennetzwerk (CSN)

Glöckner, Alexander 14 December 2005 (has links)
Inhalt der Diplomarbeit sind Untersuchungen zur Authentifizierung und Verschlüsselung von drahtlosen Netzwerkverbindungen.
10

Zabezpečení bezdrátových sítí / Wireless Network Security

Sedlák, Břetislav January 2009 (has links)
Master thesis focuses on wireless network security. The thesis is divided in two parts. First part describes today’s used standards and their components, topology and security methods as stealth SSID, MAC addresses filtration, WEP, WPA and WPA2. The last three methods are described in detail. In second part there are realized attacks on above described methods of security. There are described attacks on WEP as KoreK chopchop attack, fragment attack, attack FMS, KoreK and attack PTW. Then is described the dictionary attack on passphrase by WPA/WPA2 with PreShared Key authentication obtaining, precomputed hash tables for faster passphrase finding and for using more core procesors during dictionary browsing. The last attack describes obtaining of keystream used for encrypting of frames by WPATKIP and then sending custom data to client. It is described how to carry out each attack and how to protect against them.

Page generated in 0.0169 seconds