Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network.

The explosive growth on wireless network over the world is increased but that does not mean it is a flawless kind of technology. One of these flows or problems is the unsecured issue on 802.11 wireless standard which is authentication mechanism. Organization usually use for secure internal resource...

Full description

Saved in:
Bibliographic Details
Main Author: El Omari, Abdullah Abdelmonem M.
Format: Thesis
Language:eng
Published: 2007
Subjects:
Online Access:https://etd.uum.edu.my/65/1/abdullah_abdelmonem.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-uum-etd.65
record_format uketd_dc
institution Universiti Utara Malaysia
collection UUM ETD
language eng
topic QA76 Computer software
spellingShingle QA76 Computer software
El Omari, Abdullah Abdelmonem M.
Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network.
description The explosive growth on wireless network over the world is increased but that does not mean it is a flawless kind of technology. One of these flows or problems is the unsecured issue on 802.11 wireless standard which is authentication mechanism. Organization usually use for secure internal resource and infrastructure from attacker internet firewall. The experts believe that Access Points (AP'S) present a large number of problems; unauthorized use and access to internal data. On the other hand, one cannot ignore the truth that the AP can provide several security mechanisms. Therefore, this study aims to present the best solution to AP security problem to make it as secure as possible. The result of this study depends on a scrutinized reading for other works and personal overview that are built on academic and scientific theories. This logical solution can be summarized as the following: by increasing the number of users on wireless networks it going to be vulnerable to unauthorized use or access to their internal infrastructure, by taking the guideline can make the communications betweens client and AP more secure as possible.
format Thesis
qualification_name masters
qualification_level Master's degree
author El Omari, Abdullah Abdelmonem M.
author_facet El Omari, Abdullah Abdelmonem M.
author_sort El Omari, Abdullah Abdelmonem M.
title Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network.
title_short Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network.
title_full Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network.
title_fullStr Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network.
title_full_unstemmed Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network.
title_sort security issues in shared key authentication on ieee 802.11 wireless standards and uum wireless network.
granting_institution Universiti Utara Malaysia
granting_department College of Arts and Sciences (CAS)
publishDate 2007
url https://etd.uum.edu.my/65/1/abdullah_abdelmonem.pdf
_version_ 1747826834303614976
spelling my-uum-etd.652013-07-24T12:05:28Z Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network. 2007-12 El Omari, Abdullah Abdelmonem M. College of Arts and Sciences (CAS) Faculty of Information Technology QA76 Computer software The explosive growth on wireless network over the world is increased but that does not mean it is a flawless kind of technology. One of these flows or problems is the unsecured issue on 802.11 wireless standard which is authentication mechanism. Organization usually use for secure internal resource and infrastructure from attacker internet firewall. The experts believe that Access Points (AP'S) present a large number of problems; unauthorized use and access to internal data. On the other hand, one cannot ignore the truth that the AP can provide several security mechanisms. Therefore, this study aims to present the best solution to AP security problem to make it as secure as possible. The result of this study depends on a scrutinized reading for other works and personal overview that are built on academic and scientific theories. This logical solution can be summarized as the following: by increasing the number of users on wireless networks it going to be vulnerable to unauthorized use or access to their internal infrastructure, by taking the guideline can make the communications betweens client and AP more secure as possible. 2007-12 Thesis https://etd.uum.edu.my/65/ https://etd.uum.edu.my/65/1/abdullah_abdelmonem.pdf application/pdf eng validuser masters masters Universiti Utara Malaysia C. Gaylord and S. Lee. (2004). "Wireless LAN Security In a Campus Environment" Retrieved September 9 2007 from http://www.educause.edu/ir/library/pdf/EP00408.pdf. D. Balfanz, D. K. Smetters, P. Stewart and H. Chi Wong. (2002)."Talking To Strangers: Authentication in Ad-Hoc Wireless Networks". Retrieved July 4,2007, from http://www.isoc.org/isoc/conferences/ndss/02/proceedingslpapers/balfan.pdf. Frankie Chan, Ang H. Hoon and B. Issac. (2005). "Analysis of IEEE 802.11b Wireless Security for University LAN Design" Retrieved July 8 2007 from http://ieeexplore.ieee.org/iel5/10896/34295/01635688.pdf?tp=&isnumber=34295&arnumber-1635688. G.V. S. Raju. (2007). "Authentication in Wireless Networks" Retrieved from July 8 2007 from http://ieeexplore.ieee.org.eserv.uum.edu.my/iel5/4076361/4076362/04076928.pdf?tp=&arnumber=4076928&isnumber=4O76362. Gary McGraw (2003). "Wireless Security's Future " Retrieved August 7 2007 from http://ieeexplore.ieee.org/iel5/8013/27399/01219074.pdf. H. Imai, S. Shin, and K. Kobara. (2005). "Authenticated Key Exchange for Wireless Security" Retrieved July 8 2007 from http://ieeexplore.ieee.org/iel5/9744/30729/01424676. pdf?arnumber=1424676. Holliday and Celik. (2004). "Improving the Security of Wireless LANs by Managing 802.lx Disassociation". Retrieved July 10,2007, from http://www.cse.scu.edu/-jholliday/CCNC04.pdf. H. Boland and H. Mousavi. (2004). "Security Issues Of The IEEE 802.11B Wireless LAN". Retrieved July 8,2007, from http://ieeexplore.ieee.org.eserv.uum.edu.my/iel5/9317/296 18/01345023.pdf?tp=&arnumber=1345023&isnumber=29618. J. Liu, B. Tang, Yue Liu, Cheng Liu and Yuan'an Liu. (2005)."A Password Based Authentication Protocol for Access Control in WLAW Retrieved August 8 2007, from http://ieeexplore.ieee.org/iel5/10481/33237/01567069.pdf?arnumber=l567069&htry=5. Jason S. King. (2001). "An IEEE 802.11 Wireless LAN Security White Paper" Retrieved September 9 2007, from http://www.IInl.gov/tid/lof/documents/pdf/24467O.pdf. James Voorhees. (2001). "The Limits on Wireless Security: 802.11 in early 2002". Retrieved July 8,2007, from http://www.cs.dartmouth.edu/snanda/presentions/Wireless_Soumendra_CS188.pdf JYH-Cheng Chen, Ming-Chia Jiang and Yi-Wen Liu(2005). "Wireless LAN Security And IEEE 802.11I". Retrieved July 4,2007, from http://ieeexplore.ieee.org.eserv.uum.edu.my/iel5/7742/30466/01404570.pdf?tp=&arnumber=1404570&isnumber=30466. Kevin Tyrrell. (2003)."An Overview Of Wireless Security Issues". Retrieved June 23, 2007, from http://www.giac.org/certified_professionals/practicals/gsec/2471.php. M. Badra and I. Hajjeh. (2006). "Key-Exchange Authentication Using Shared Secrets" Retrieved August 7 2007 from http://ieeexplore.ieee.org/iel5/2/33768/0160795 1.pdf. NETGEAR. (2005). "Wireless Networking Basics" Retrieved September 3 2007 from http://documentation.netgear.com/reference/ita/wireless/pdfs/Ful1Manual.pdf. Neil Smyth. (2006). "WLAN Security Processor" Retrieved August 7 2007 from http://ieeexplore.ieee.org/iel5/8919/28238/101109TCSI2006877888.pdf. P. Krishnamurthy, J. Kabara and T. Anusas-amornkul.(2002). "Security In Wireless Residential Networks". Retrieved July 10,2007, from http://ieeexplore.ieee.org/iel5/30/21776/01010106.pdf?tp=&isnurnber=&arnumber=1010106. S. Shin, K. Kobara and H. Imai. (2006). "Elliptic Curve based Authenticated Key Agreement Protocol for Wireless Security" Retrieved August 8 2007 from http://ieeexplore.ieee.org/ie15/4072023/4O76086/04076 127.pdf?tp=&isnumber=&arnumber=4076127. Sandra Kay Miller. (2001). "Facing the Challenge of Wireless Security" Retrieved September 4 2007 from http://www.sandrakaymiller.com/clips/wirelesssecurity.pdf. T. Karygiannis L. Owens. (e. d.). " Wireless Network Security 802.11, Bluetooth and Handheld Devices " Retrieved July 7 2007 from http://csrc.nist.gov/publications/nistpubs/800_48/NIST_SP_800-48.pdf. W. A. Arbaugh, N. Shankar and Y. C. Justin Wan. (2002)." Your 802.11 Wireless Networks Has No Clothes". Retrieved June 22,2007, fiom http://ieeexplore.ieee.org/iel5/7742/26001/01160080.pdf?tp=&isnumber=&arnumber=1160080. William A. Arbaugh. (2003). "Wireless Security Is Different" Retrieved August 7 2007 from http://ieeexplore.ieee.org/ieI5/2/27423/O1220591.pdf?code=2.