• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 14
  • 5
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 36
  • 36
  • 9
  • 7
  • 7
  • 7
  • 7
  • 7
  • 6
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Zabezpečení bezdrátových sítí a možné útoky na tyto sítě / Wireless networks security and possible attacks on these networks

Vlček, Peter January 2010 (has links)
The first of the main objectives of this work was to examine and study the different types of attacks on wireless networks. This work is focused on the most commonly occurring types of attacks such as WEP/WPA/WPA2 cracking, a Man in the Middle attack (MIM), Dictionary attacks, MAC spoofing and finally Denial of Service attacks. Description of individual attacks is also accompanied by detailed instructions on how to carry out these attacks on the Windows platform. It is described how to detect various attacks and identified. It is then implemented software that is able to identify possible risk of selected types of attacks. This software belongs to a group of wireless intrusion prevention system (WIDS). It focuses on attacks WEP/WPA/WPA2 type of cracking, Dictionary attacks and MAC spoofing. For the implementation of defense against attack by a Man in the Middle (MIM) and Denial of Service attack would need special monitoring equipment.
2

Securing Access to Wireless Local Area Networks using a Passive Approach to Device Identification

Corbett, Cherita L. 06 April 2006 (has links)
IEEE 802.11 wireless networks are plagued with problems of unauthorized access. Left undetected, unauthorized access is the precursor to additional mischief. Current approaches to detecting intruders are invasive or can be evaded by stealthy attackers. We propose the use of spectral analysis to identify the type of wireless network interface card (NIC). This mechanism can be applied to support the detection of unauthorized systems that use NICs which are different from that of a legitimate system. We focus on two functions, active scanning and dynamic rate switching, required by the 802.11 standard that are implemented in the hardware and software of the wireless NIC. We show that the implementation of these functions influence the transmission patterns of a wireless stream that are observable through traffic analysis. Furthermore, differences in the behavior of a wireless stream caused by differences in the implementation of these functions are exploited to establish the identity of a NIC. Our mechanism for NIC identification uses signal processing to analyze the periodicity embedded in the wireless traffic caused by active scanning and rate switching. A spectral profile is created from the periodic components of the traffic and used for the identity of the wireless NIC. We show that we can discern between NICs manufactured by different vendors and NICs within the same manufacturer using the spectral profile.
3

Exploring the Sensing Capability of Wireless Signals

Du, Changlai 06 July 2018 (has links)
Wireless communications are ubiquitous nowadays, especially in the new era of Internet of Things (IoT). Most of IoT devices access the Internet via some kind of wireless connections. The major role of wireless signals is a type of communication medium. Besides that, taking advantage of the growing physical layer capabilities of wireless techniques, recent research has demonstrated the possibility of reusing wireless signals for both communication and sensing. The capability of wireless sensing and the ubiquitous availability of wireless signals make it possible to meet the rising demand of pervasive environment perception. Physical layer features including signal attributes and channel state information (CSI) can be used for the purpose of physical world sensing. This dissertation focuses on exploring the sensing capability of wireless signals. The research approach is to first take measurements from physical layer of wireless connections, and then develop various techniques to extract or infer information about the environment from the measurements, like the locations of signal sources, the motion of human body, etc. The research work in this dissertation makes three contributions. We start from wireless signal attributes analysis. Specifically, the cyclostationarity properties of wireless signals are studied. Taking WiFi signals as an example, we propose signal cyclostationarity models induced by WiFi Orthogonal Frequency Division Multiplexing (OFDM) structure including pilots, cyclic prefix, and preambles. The induced cyclic frequencies is then applied to the signal-selective direction estimation problem. Second, based on the analysis of wireless signal attributes, we design and implement a prototype of a single device system, named MobTrack, which can locate indoor interfering radios. The goal of designing MobTrack is to provide a lightweight, handhold system that can locate interfering radios with sub-meter accuracy with as few antennas as possible. With a small antenna array, the cost, complexity as well as size of this device are reduced. MobTrack is the first single device indoor interference localization system without the requirement of multiple pre-deployed access points (AP). Third, channel state information is studied in applications of human motion sensing. We design WiTalk, the first system which is able to do fine-grained motion sensing like leap reading on smartphones using the CSI dynamics generated by human movements. WiTalk proposes a new fine-grained human motion sensing technique with the distinct context-free feature. To achieve this goal using CSI, WiTalk generates CSI spectrograms using signal processing techniques and extracts features by calculating the contours of the CSI spectrograms. The proposed technique is verified in the application scenario of lip reading, where the fine-grained motion is the mouth movements. / Ph. D. / Wireless communications are ubiquitous nowadays, especially in the new era of Internet of Things (IoT). Most of IoT devices access the Internet via some kind of wireless connections. The major role of wireless signals is a type of communication medium. Besides that, taking advantage of the growing physical layer capabilities of wireless techniques, recent research has demonstrated the possibility of reusing wireless signals for both communication and sensing. The capability of wireless sensing and the ubiquitous availability of wireless signals make it possible to meet the rising demand of pervasive environment perception. Physical layer features including signal attributes and channel state information (CSI) can be used for the purpose of physical world sensing. This dissertation focuses on exploring the sensing capability of wireless signals. The research approach is to first take measurements from physical layer of wireless connections, and then develop various techniques to extract or infer information about the environment from the measurements, like the locations of signal sources, the motion of human body, etc. Based on the analysis to cyclostationary properties of wireless signals, we propose a new method for indoor interference source localization. We also design a fine-grained human motion detection system using channel state information, which can be applied to application scenarios like lip reading.
4

The Impact Of Wireless Security Protocols on Post Processed Telemetry Data Transfer

Kalibjian, Jeffrey R. 10 1900 (has links)
International Telemetering Conference Proceedings / October 21, 2002 / Town & Country Hotel and Conference Center, San Diego, California / Commercial wireless protocol use (e.g. Wireless Access Protocol, Bluetooth, etc.) is becoming widespread as the demand to access computing devices in remote locations grows. Although not widely prevalent today, wireless access of post processed telemetry data will become a common activity. Essential to the use of such a capability is the security of the wireless links involved in the data transfer. Each wireless protocol has an associated security paradigm. Some protocols have stronger security schemes than others and this should influence protocol selection for particular telemetry data transfer applications.
5

Towards Secure and Trustworthy Wireless Ad hoc Networks

Ren, Yonglin 19 June 2012 (has links)
Due to the attractive advantages of wireless communication technologies, wireless networking and mobile computing has developed expeditiously and gained ample prevalence. Thereby, many practical applications are being designed for the use of wireless ad hoc networks in both military and civilian scenarios. However, some security concerns have arisen from such networks, especially in that misbehaving nodes pose a major threat during the construction of a trusted network. Therefore, security is one of the key challenges in wireless ad hoc networks, requiring significant attention due to their own features and concerns. This thesis presents several computational models and security strategies for the design of secure, trustworthy networks, which are able to make rational decisions when encountering potential threats. In this thesis, we first propose a distributed network management model for secure group communication. Our approach simplifies the complexity of traditional group management and supports the inclusion of other security mechanisms for the purpose of secure communications. As a decentralized management method, trust can perform well in a dynamic and agile environment. Our proposed trust system defines the concept of trust, establishes the trust relationship between distributed nodes, involves the novel and effective computational model, and specifies a set of trust-based rules in this system for wireless nodes. We also propose a hybrid cryptosystem through the application of both symmetric and asymmetric key algorithms to provide reliable and secure protection of data confidentiality. With the design of selective encryption, uncertainty is incorporated into data encryption and the overhead spent on the data protection is significantly reduced. Thus, the communicating parties not only obtain reliable security protection, but also improve the efficiency of data communication. Through security analysis and simulation experiments, we have shown how decentralized management is useful in wireless and ad hoc scenarios, how trust provides feasible solutions for misbehavior detection, and how our proposed strategies offer security properties.
6

Towards Secure and Trustworthy Wireless Ad hoc Networks

Ren, Yonglin 19 June 2012 (has links)
Due to the attractive advantages of wireless communication technologies, wireless networking and mobile computing has developed expeditiously and gained ample prevalence. Thereby, many practical applications are being designed for the use of wireless ad hoc networks in both military and civilian scenarios. However, some security concerns have arisen from such networks, especially in that misbehaving nodes pose a major threat during the construction of a trusted network. Therefore, security is one of the key challenges in wireless ad hoc networks, requiring significant attention due to their own features and concerns. This thesis presents several computational models and security strategies for the design of secure, trustworthy networks, which are able to make rational decisions when encountering potential threats. In this thesis, we first propose a distributed network management model for secure group communication. Our approach simplifies the complexity of traditional group management and supports the inclusion of other security mechanisms for the purpose of secure communications. As a decentralized management method, trust can perform well in a dynamic and agile environment. Our proposed trust system defines the concept of trust, establishes the trust relationship between distributed nodes, involves the novel and effective computational model, and specifies a set of trust-based rules in this system for wireless nodes. We also propose a hybrid cryptosystem through the application of both symmetric and asymmetric key algorithms to provide reliable and secure protection of data confidentiality. With the design of selective encryption, uncertainty is incorporated into data encryption and the overhead spent on the data protection is significantly reduced. Thus, the communicating parties not only obtain reliable security protection, but also improve the efficiency of data communication. Through security analysis and simulation experiments, we have shown how decentralized management is useful in wireless and ad hoc scenarios, how trust provides feasible solutions for misbehavior detection, and how our proposed strategies offer security properties.
7

Towards Secure and Trustworthy Wireless Ad hoc Networks

Ren, Yonglin January 2012 (has links)
Due to the attractive advantages of wireless communication technologies, wireless networking and mobile computing has developed expeditiously and gained ample prevalence. Thereby, many practical applications are being designed for the use of wireless ad hoc networks in both military and civilian scenarios. However, some security concerns have arisen from such networks, especially in that misbehaving nodes pose a major threat during the construction of a trusted network. Therefore, security is one of the key challenges in wireless ad hoc networks, requiring significant attention due to their own features and concerns. This thesis presents several computational models and security strategies for the design of secure, trustworthy networks, which are able to make rational decisions when encountering potential threats. In this thesis, we first propose a distributed network management model for secure group communication. Our approach simplifies the complexity of traditional group management and supports the inclusion of other security mechanisms for the purpose of secure communications. As a decentralized management method, trust can perform well in a dynamic and agile environment. Our proposed trust system defines the concept of trust, establishes the trust relationship between distributed nodes, involves the novel and effective computational model, and specifies a set of trust-based rules in this system for wireless nodes. We also propose a hybrid cryptosystem through the application of both symmetric and asymmetric key algorithms to provide reliable and secure protection of data confidentiality. With the design of selective encryption, uncertainty is incorporated into data encryption and the overhead spent on the data protection is significantly reduced. Thus, the communicating parties not only obtain reliable security protection, but also improve the efficiency of data communication. Through security analysis and simulation experiments, we have shown how decentralized management is useful in wireless and ad hoc scenarios, how trust provides feasible solutions for misbehavior detection, and how our proposed strategies offer security properties.
8

A Novel Security Scheme during Vertical Handoff in Integrated Heterogeneous Wireless Networks

Rastogi, Nidhi January 2009 (has links)
No description available.
9

Designing Physical Primitives For Secure Communication In Wireless Sensor Networks

Sang, Lifeng 23 August 2010 (has links)
No description available.
10

Decentralized Trust-Based Access Control for Dynamic Collaborative Environments

Adams, William Joseph 10 April 2006 (has links)
The goal of this research was to create a decentralized trust-based access control (TBAC) system for a dynamic collaborative environment (DCE). By building a privilege management infrastructure (PMI) based on trust, user access was determined using behavior grading without the need for pre-configured, centrally managed role hierarchies or permission sets. The PMI provided TBAC suitable for deployment in a rapidly assembled, highly fluid, collaborative environment. DCEs were assembled and changed membership as required to achieve the goals of the group. A feature of these environments was that there was no way of knowing who would join the group, no way of refusing anyone entry into group, and no way of determining how long members would remain in the group. DCEs were formed quickly to enable participants to share information while, at the same time, allowing them to retain control over the resources that they brought with them to the coalition. This research progressed the state of the art in the fields of access control and trust management. The Trust Management System developed through this research effectively implemented a decentralized access control scheme. Each resource owner independently evaluated the reputation and risk of network members to make access decisions. Because the PMI system used past behavior as an indication of future performance, no a priori user or resource configuration was required. / Ph. D.

Page generated in 0.0631 seconds