Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network.
The explosive growth on wireless network over the world is increased but that does not mean it is a flawless kind of technology. One of these flows or problems is the unsecured issue on 802.11 wireless standard which is authentication mechanism. Organization usually use for secure internal resource...
Saved in:
主要作者: | |
---|---|
格式: | Thesis |
语言: | eng |
出版: |
2007
|
主题: | |
在线阅读: | https://etd.uum.edu.my/65/1/abdullah_abdelmonem.pdf |
标签: |
添加标签
没有标签, 成为第一个标记此记录!
|
id |
my-uum-etd.65 |
---|---|
record_format |
uketd_dc |
institution |
Universiti Utara Malaysia |
collection |
UUM ETD |
language |
eng |
topic |
QA76 Computer software |
spellingShingle |
QA76 Computer software El Omari, Abdullah Abdelmonem M. Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network. |
description |
The explosive growth on wireless network over the world is increased but that does not mean it is a flawless kind of technology. One of these flows or problems is the unsecured issue on 802.11 wireless standard which is authentication mechanism. Organization usually use for secure internal resource and infrastructure from attacker
internet firewall. The experts believe that Access Points (AP'S) present a large number of problems; unauthorized use and access to internal data. On the other hand, one cannot ignore the truth that the AP can provide several security mechanisms. Therefore, this study aims to present the best solution to AP security problem to make it as secure as possible. The result of this study depends on a scrutinized reading for other works and personal overview that are built on academic and scientific theories. This logical solution can be summarized as the following: by increasing the number of users on wireless networks it going to be vulnerable to unauthorized use or access to their internal infrastructure, by taking the guideline can make the communications betweens client and AP more secure as possible. |
format |
Thesis |
qualification_name |
masters |
qualification_level |
Master's degree |
author |
El Omari, Abdullah Abdelmonem M. |
author_facet |
El Omari, Abdullah Abdelmonem M. |
author_sort |
El Omari, Abdullah Abdelmonem M. |
title |
Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network. |
title_short |
Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network. |
title_full |
Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network. |
title_fullStr |
Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network. |
title_full_unstemmed |
Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network. |
title_sort |
security issues in shared key authentication on ieee 802.11 wireless standards and uum wireless network. |
granting_institution |
Universiti Utara Malaysia |
granting_department |
College of Arts and Sciences (CAS) |
publishDate |
2007 |
url |
https://etd.uum.edu.my/65/1/abdullah_abdelmonem.pdf |
_version_ |
1747826834303614976 |
spelling |
my-uum-etd.652013-07-24T12:05:28Z Security Issues In Shared Key Authentication on IEEE 802.11 Wireless Standards and UUM Wireless Network. 2007-12 El Omari, Abdullah Abdelmonem M. College of Arts and Sciences (CAS) Faculty of Information Technology QA76 Computer software The explosive growth on wireless network over the world is increased but that does not mean it is a flawless kind of technology. One of these flows or problems is the unsecured issue on 802.11 wireless standard which is authentication mechanism. Organization usually use for secure internal resource and infrastructure from attacker internet firewall. The experts believe that Access Points (AP'S) present a large number of problems; unauthorized use and access to internal data. On the other hand, one cannot ignore the truth that the AP can provide several security mechanisms. Therefore, this study aims to present the best solution to AP security problem to make it as secure as possible. The result of this study depends on a scrutinized reading for other works and personal overview that are built on academic and scientific theories. This logical solution can be summarized as the following: by increasing the number of users on wireless networks it going to be vulnerable to unauthorized use or access to their internal infrastructure, by taking the guideline can make the communications betweens client and AP more secure as possible. 2007-12 Thesis https://etd.uum.edu.my/65/ https://etd.uum.edu.my/65/1/abdullah_abdelmonem.pdf application/pdf eng validuser masters masters Universiti Utara Malaysia C. Gaylord and S. Lee. (2004). "Wireless LAN Security In a Campus Environment" Retrieved September 9 2007 from http://www.educause.edu/ir/library/pdf/EP00408.pdf. D. Balfanz, D. K. Smetters, P. Stewart and H. Chi Wong. (2002)."Talking To Strangers: Authentication in Ad-Hoc Wireless Networks". Retrieved July 4,2007, from http://www.isoc.org/isoc/conferences/ndss/02/proceedingslpapers/balfan.pdf. Frankie Chan, Ang H. Hoon and B. Issac. (2005). "Analysis of IEEE 802.11b Wireless Security for University LAN Design" Retrieved July 8 2007 from http://ieeexplore.ieee.org/iel5/10896/34295/01635688.pdf?tp=&isnumber=34295&arnumber-1635688. G.V. S. Raju. (2007). "Authentication in Wireless Networks" Retrieved from July 8 2007 from http://ieeexplore.ieee.org.eserv.uum.edu.my/iel5/4076361/4076362/04076928.pdf?tp=&arnumber=4076928&isnumber=4O76362. Gary McGraw (2003). "Wireless Security's Future " Retrieved August 7 2007 from http://ieeexplore.ieee.org/iel5/8013/27399/01219074.pdf. H. Imai, S. Shin, and K. Kobara. (2005). "Authenticated Key Exchange for Wireless Security" Retrieved July 8 2007 from http://ieeexplore.ieee.org/iel5/9744/30729/01424676. pdf?arnumber=1424676. Holliday and Celik. (2004). "Improving the Security of Wireless LANs by Managing 802.lx Disassociation". Retrieved July 10,2007, from http://www.cse.scu.edu/-jholliday/CCNC04.pdf. H. Boland and H. Mousavi. (2004). "Security Issues Of The IEEE 802.11B Wireless LAN". Retrieved July 8,2007, from http://ieeexplore.ieee.org.eserv.uum.edu.my/iel5/9317/296 18/01345023.pdf?tp=&arnumber=1345023&isnumber=29618. J. Liu, B. Tang, Yue Liu, Cheng Liu and Yuan'an Liu. (2005)."A Password Based Authentication Protocol for Access Control in WLAW Retrieved August 8 2007, from http://ieeexplore.ieee.org/iel5/10481/33237/01567069.pdf?arnumber=l567069&htry=5. Jason S. King. (2001). "An IEEE 802.11 Wireless LAN Security White Paper" Retrieved September 9 2007, from http://www.IInl.gov/tid/lof/documents/pdf/24467O.pdf. James Voorhees. (2001). "The Limits on Wireless Security: 802.11 in early 2002". Retrieved July 8,2007, from http://www.cs.dartmouth.edu/snanda/presentions/Wireless_Soumendra_CS188.pdf JYH-Cheng Chen, Ming-Chia Jiang and Yi-Wen Liu(2005). "Wireless LAN Security And IEEE 802.11I". Retrieved July 4,2007, from http://ieeexplore.ieee.org.eserv.uum.edu.my/iel5/7742/30466/01404570.pdf?tp=&arnumber=1404570&isnumber=30466. Kevin Tyrrell. (2003)."An Overview Of Wireless Security Issues". Retrieved June 23, 2007, from http://www.giac.org/certified_professionals/practicals/gsec/2471.php. M. Badra and I. Hajjeh. (2006). "Key-Exchange Authentication Using Shared Secrets" Retrieved August 7 2007 from http://ieeexplore.ieee.org/iel5/2/33768/0160795 1.pdf. NETGEAR. (2005). "Wireless Networking Basics" Retrieved September 3 2007 from http://documentation.netgear.com/reference/ita/wireless/pdfs/Ful1Manual.pdf. Neil Smyth. (2006). "WLAN Security Processor" Retrieved August 7 2007 from http://ieeexplore.ieee.org/iel5/8919/28238/101109TCSI2006877888.pdf. P. Krishnamurthy, J. Kabara and T. Anusas-amornkul.(2002). "Security In Wireless Residential Networks". Retrieved July 10,2007, from http://ieeexplore.ieee.org/iel5/30/21776/01010106.pdf?tp=&isnurnber=&arnumber=1010106. S. Shin, K. Kobara and H. Imai. (2006). "Elliptic Curve based Authenticated Key Agreement Protocol for Wireless Security" Retrieved August 8 2007 from http://ieeexplore.ieee.org/ie15/4072023/4O76086/04076 127.pdf?tp=&isnumber=&arnumber=4076127. Sandra Kay Miller. (2001). "Facing the Challenge of Wireless Security" Retrieved September 4 2007 from http://www.sandrakaymiller.com/clips/wirelesssecurity.pdf. T. Karygiannis L. Owens. (e. d.). " Wireless Network Security 802.11, Bluetooth and Handheld Devices " Retrieved July 7 2007 from http://csrc.nist.gov/publications/nistpubs/800_48/NIST_SP_800-48.pdf. W. A. Arbaugh, N. Shankar and Y. C. Justin Wan. (2002)." Your 802.11 Wireless Networks Has No Clothes". Retrieved June 22,2007, fiom http://ieeexplore.ieee.org/iel5/7742/26001/01160080.pdf?tp=&isnumber=&arnumber=1160080. William A. Arbaugh. (2003). "Wireless Security Is Different" Retrieved August 7 2007 from http://ieeexplore.ieee.org/ieI5/2/27423/O1220591.pdf?code=2. |