教育論文網

Proposed Secure WLAN Architecture Based on Security Analysis of an Existing Campus WLAN

碩士博士畢業論文站內搜索    
分類:教育論文網→工業技術論文→自動化技術、計算機技術論文計算技術、計算機技術論文計算機的應用論文計算機網絡論文一般性問題論文
Proposed Secure WLAN Architecture Based on Security Analysis of an Existing Campus WLAN
論文目錄
 
Abstract第1-8頁
摘要第8-16頁
CHAPTER 1: INTRODUCTION第16-20頁
  1.1 Introduction第16-17頁
  1.2 Problem Statement第17頁
  1.3 Objectives of Research第17-18頁
    1.3.1 General Objectives第17-18頁
    1.3.2 Specific Objectives第18頁
  1.4 Research Methodology第18頁
  1.5 Scope and Limitation of The Research Work第18頁
  1.6 Thesis Organisation第18-20頁
CHAPTER TWO: LITERATURE REVIEW第20-47頁
  2.1 Introduction第20頁
  2.2 Wireless Local Area Network (WLAN)第20頁
  2.3 The 802.11 Standards for WLAN第20-24頁
    2.3.1 IEEE 802.11b第21頁
    2.3.2 IEEE 802.11a第21頁
    2.3.3 IEEE 802.11g第21-22頁
    2.3.4 IEEE 802.11n第22頁
    2.3.5 IEEE 802.11i第22-23頁
    2.3.6 Summary of IEEE 802.11 WLAN Standards第23-24頁
  2.4 Architecture Overview of WLAN第24-28頁
    2.4.1 Ad Hoc Mode第24-25頁
    2.4.2 Infrastructure-based Networks第25頁
    2.4.3 Components of IEEE 802.11 Infrastructure Mode Architecture第25-27頁
    2.4.4 The Management Frames of IEEE 802.11第27-28頁
  2.5 Attacks on WLANs第28-33頁
    2.5.1 Types of Attacks on WLANs第28頁
    2.5.2 Logical Attacks WLANs with their Palliation Techniques第28-32頁
    2.5.3 Physical Attack with their Palliation Techniques第32-33頁
  2.6 WLAN Security Standards第33-47頁
    2.6.1 Wired Equivalent Privacy (WEP)第34-37頁
    2.6.2 Wi-Fi Protected Access (WPA)第37-40頁
    2.6.3 IEEE 802.11ior Robust Security Network (RSN) or WPA2第40-41頁
    2.6.4 Access Control with IEEE 802.1X第41-46頁
    2.6.5 Chapter Summary第46-47頁
CHAPTER THREE: METHODOLOGY第47-62頁
  3.1 Introduction第47頁
  3.2 Brief Description of Ho Technical University第47-48頁
  3.3 Wireless LAN Deployment on HO-Poly Campus第48-51頁
    3.3.1 Wireless Network Layout for HO-Poly第49-51頁
  3.4 Tools Used for Wardriving on HO-Poly WLAN第51頁
  3.5 Machine Setup for Checking Available APs Details on HO-POLY Campus第51-52頁
    3.5.1 Software Requirement第52頁
    3.5.2 Hardware Equipment and Specifications第52頁
  3.6 Tunneling Through the Firewall of HO-POLY via Unsecured (Open) AP第52-54頁
    3.6.1 Software Requirement第52-53頁
    3.6.2 Hardware Equipment and Specifications第53頁
    3.6.3 Steps Involved in Tunneling through HO-POLY Firewall via Unsecured AP第53-54頁
  3.7 Cracking HO-POLYAP with WEP Security Encryption第54-58頁
    3.7.1 Software Requirement:第54頁
    3.7.2 Hardware Equipment and Specifications:第54-55頁
    3.7.3 Assumptions for WEP Cracking第55頁
    3.7.4 Steps Involved in Cracking WEP on HO-POLY WLAN第55-58頁
  3.8 Cracking HO-POLYAP with WPA/WPA2 Security Encryption第58-60頁
    3.8.1 Software Requirement第58頁
    3.8.2 Hardware Equipment and Specifications第58-59頁
    3.8.3 Assumptions for WEP Cracking第59頁
    3.8.4 Steps Involved in Cracking WPA/WPA2 on HO-POLY WLAN第59-60頁
  3.9 Decrypting Packets on an Unsecured Access Point Using Wireshark第60-62頁
CHAPTER FOUR: ANALYSIS AND EVALUATION OF EXPERIMENTALRESULTS第62-74頁
  4.1 Introduction第62頁
  4.2 Presentation and Discussion of Experimental Results第62-68頁
    4.2.1 Results and Discussion of Available APs on HO-POLY Campus第62-64頁
    4.2.2 Result and Discussion of Open (Unsecured) Access Point第64-65頁
    4.2.3 Result and Discussion of WEP Configured Access Point第65-66頁
    4.2.4 Result and Discussion of WPA/WPA2-PSK Configured Access Point第66-68頁
  4.3 Proposed Solution for HO-POLYWLAN第68-69頁
  4.4 Seven Key Steps to Prepare for WPA2 Deployment on HO-POLY Campus第69-71頁
    4.4.1 Security Mechanism and Credentials第70頁
    4.4.2 User Authentication Database第70頁
    4.4.3 Client Operating Systems第70頁
    4.4.4 Supplicants第70頁
    4.4.5 EAP Types第70-71頁
    4.4.6 Authentication Server第71頁
    4.4.7 Access Points and C!ient NIC Cards第71頁
  4.5 An Example of WPA Deployment Configurations第71-74頁
    4.5.1 Deploying WPA2 Wireless Encryption in a Windows第71-74頁
SUMMARY OF FINDINGS,CONCLUSION AND RECOMMENDATION第74-76頁
REFERENCES第76-79頁
ACKNOWLEDGEMENTS第79-80頁
APPENDICES第80-81頁

本篇論文共81頁,點擊這進入下載頁面
 
更多相關論文
Proposed Secure WLAN Architectur
An Analytical Assessment and Exa
Routing Protocol for Low Power L
West Africa Accounting Developme
Lost in Translation Sociolinguis
China:a History of the Nation th
Intra African Trade in the21~(st
The Analysis of Foreign Direct I
Do Imports Contribute to the Tec
The Analysis of Laos-Sino Trade
Brand Loyalty of Chinese Custome
The Contribution of Trade Condit
Human Resource Development in An
Factors Affecting the Financial
Service Delivery of Water Supply
Trade and Economic Relations bet
Attracting Chinese FDI to Mongol
Analysis of Sucres Benefits for
The Arrangements Cape Verde Shou
An Analysis on the Competitivene
Poverty Reduction Strategy Botsw
Supply Chain Management Optimiza
Poverty Reduction Strategy Bostw
The Impact of Reward Packages on
Study on the Relationship betwee
欄 目 導 航
 
 
WPA WEP
版權申明:目錄由用戶提供,www.yhqmct.live僅收錄目錄,作者需要刪除這篇論文目錄請點擊這里
| 設為首頁||加入收藏||站內搜索引擎||站點地圖||在線購卡|
版權所有 教育論文網 Copyright(C) All Rights Reserved
吉林快3走势图下载安装