首页--工业技术论文--自动化技术、计算机技术论文--计算技术、计算机技术论文--计算机的应用论文--计算机网络论文--一般性问题论文

Proposed Secure WLAN Architecture Based on Security Analysis of an Existing Campus WLAN

Abstract第6-7页
摘要第8-16页
CHAPTER 1: INTRODUCTION第16-20页
    1.1 Introduction第16-17页
    1.2 Problem Statement第17页
    1.3 Objectives of Research第17-18页
        1.3.1 General Objectives第17-18页
        1.3.2 Specific Objectives第18页
    1.4 Research Methodology第18页
    1.5 Scope and Limitation of The Research Work第18页
    1.6 Thesis Organisation第18-20页
CHAPTER TWO: LITERATURE REVIEW第20-47页
    2.1 Introduction第20页
    2.2 Wireless Local Area Network (WLAN)第20页
    2.3 The 802.11 Standards for WLAN第20-24页
        2.3.1 IEEE 802.11b第21页
        2.3.2 IEEE 802.11a第21页
        2.3.3 IEEE 802.11g第21-22页
        2.3.4 IEEE 802.11n第22页
        2.3.5 IEEE 802.11i第22-23页
        2.3.6 Summary of IEEE 802.11 WLAN Standards第23-24页
    2.4 Architecture Overview of WLAN第24-28页
        2.4.1 Ad Hoc Mode第24-25页
        2.4.2 Infrastructure-based Networks第25页
        2.4.3 Components of IEEE 802.11 Infrastructure Mode Architecture第25-27页
        2.4.4 The Management Frames of IEEE 802.11第27-28页
    2.5 Attacks on WLANs第28-33页
        2.5.1 Types of Attacks on WLANs第28页
        2.5.2 Logical Attacks WLANs with their Palliation Techniques第28-32页
        2.5.3 Physical Attack with their Palliation Techniques第32-33页
    2.6 WLAN Security Standards第33-47页
        2.6.1 Wired Equivalent Privacy (WEP)第34-37页
        2.6.2 Wi-Fi Protected Access (WPA)第37-40页
        2.6.3 IEEE 802.11ior Robust Security Network (RSN) or WPA2第40-41页
        2.6.4 Access Control with IEEE 802.1X第41-46页
        2.6.5 Chapter Summary第46-47页
CHAPTER THREE: METHODOLOGY第47-62页
    3.1 Introduction第47页
    3.2 Brief Description of Ho Technical University第47-48页
    3.3 Wireless LAN Deployment on HO-Poly Campus第48-51页
        3.3.1 Wireless Network Layout for HO-Poly第49-51页
    3.4 Tools Used for Wardriving on HO-Poly WLAN第51页
    3.5 Machine Setup for Checking Available APs Details on HO-POLY Campus第51-52页
        3.5.1 Software Requirement第52页
        3.5.2 Hardware Equipment and Specifications第52页
    3.6 Tunneling Through the Firewall of HO-POLY via Unsecured (Open) AP第52-54页
        3.6.1 Software Requirement第52-53页
        3.6.2 Hardware Equipment and Specifications第53页
        3.6.3 Steps Involved in Tunneling through HO-POLY Firewall via Unsecured AP第53-54页
    3.7 Cracking HO-POLYAP with WEP Security Encryption第54-58页
        3.7.1 Software Requirement:第54页
        3.7.2 Hardware Equipment and Specifications:第54-55页
        3.7.3 Assumptions for WEP Cracking第55页
        3.7.4 Steps Involved in Cracking WEP on HO-POLY WLAN第55-58页
    3.8 Cracking HO-POLYAP with WPA/WPA2 Security Encryption第58-60页
        3.8.1 Software Requirement第58页
        3.8.2 Hardware Equipment and Specifications第58-59页
        3.8.3 Assumptions for WEP Cracking第59页
        3.8.4 Steps Involved in Cracking WPA/WPA2 on HO-POLY WLAN第59-60页
    3.9 Decrypting Packets on an Unsecured Access Point Using Wireshark第60-62页
CHAPTER FOUR: ANALYSIS AND EVALUATION OF EXPERIMENTALRESULTS第62-74页
    4.1 Introduction第62页
    4.2 Presentation and Discussion of Experimental Results第62-68页
        4.2.1 Results and Discussion of Available APs on HO-POLY Campus第62-64页
        4.2.2 Result and Discussion of Open (Unsecured) Access Point第64-65页
        4.2.3 Result and Discussion of WEP Configured Access Point第65-66页
        4.2.4 Result and Discussion of WPA/WPA2-PSK Configured Access Point第66-68页
    4.3 Proposed Solution for HO-POLYWLAN第68-69页
    4.4 Seven Key Steps to Prepare for WPA2 Deployment on HO-POLY Campus第69-71页
        4.4.1 Security Mechanism and Credentials第70页
        4.4.2 User Authentication Database第70页
        4.4.3 Client Operating Systems第70页
        4.4.4 Supplicants第70页
        4.4.5 EAP Types第70-71页
        4.4.6 Authentication Server第71页
        4.4.7 Access Points and C!ient NIC Cards第71页
    4.5 An Example of WPA Deployment Configurations第71-74页
        4.5.1 Deploying WPA2 Wireless Encryption in a Windows第71-74页
SUMMARY OF FINDINGS,CONCLUSION AND RECOMMENDATION第74-76页
REFERENCES第76-79页
ACKNOWLEDGEMENTS第79-80页
APPENDICES第80-81页

论文共81页,点击 下载论文
上一篇:基于B/S的教学培训信息管理系统的设计与实现
下一篇:Implementation and Performance Analyisis of SDN Firewall on POX Controller