| Abstract | 第6-7页 |
| 摘要 | 第8-16页 |
| CHAPTER 1: INTRODUCTION | 第16-20页 |
| 1.1 Introduction | 第16-17页 |
| 1.2 Problem Statement | 第17页 |
| 1.3 Objectives of Research | 第17-18页 |
| 1.3.1 General Objectives | 第17-18页 |
| 1.3.2 Specific Objectives | 第18页 |
| 1.4 Research Methodology | 第18页 |
| 1.5 Scope and Limitation of The Research Work | 第18页 |
| 1.6 Thesis Organisation | 第18-20页 |
| CHAPTER TWO: LITERATURE REVIEW | 第20-47页 |
| 2.1 Introduction | 第20页 |
| 2.2 Wireless Local Area Network (WLAN) | 第20页 |
| 2.3 The 802.11 Standards for WLAN | 第20-24页 |
| 2.3.1 IEEE 802.11b | 第21页 |
| 2.3.2 IEEE 802.11a | 第21页 |
| 2.3.3 IEEE 802.11g | 第21-22页 |
| 2.3.4 IEEE 802.11n | 第22页 |
| 2.3.5 IEEE 802.11i | 第22-23页 |
| 2.3.6 Summary of IEEE 802.11 WLAN Standards | 第23-24页 |
| 2.4 Architecture Overview of WLAN | 第24-28页 |
| 2.4.1 Ad Hoc Mode | 第24-25页 |
| 2.4.2 Infrastructure-based Networks | 第25页 |
| 2.4.3 Components of IEEE 802.11 Infrastructure Mode Architecture | 第25-27页 |
| 2.4.4 The Management Frames of IEEE 802.11 | 第27-28页 |
| 2.5 Attacks on WLANs | 第28-33页 |
| 2.5.1 Types of Attacks on WLANs | 第28页 |
| 2.5.2 Logical Attacks WLANs with their Palliation Techniques | 第28-32页 |
| 2.5.3 Physical Attack with their Palliation Techniques | 第32-33页 |
| 2.6 WLAN Security Standards | 第33-47页 |
| 2.6.1 Wired Equivalent Privacy (WEP) | 第34-37页 |
| 2.6.2 Wi-Fi Protected Access (WPA) | 第37-40页 |
| 2.6.3 IEEE 802.11ior Robust Security Network (RSN) or WPA2 | 第40-41页 |
| 2.6.4 Access Control with IEEE 802.1X | 第41-46页 |
| 2.6.5 Chapter Summary | 第46-47页 |
| CHAPTER THREE: METHODOLOGY | 第47-62页 |
| 3.1 Introduction | 第47页 |
| 3.2 Brief Description of Ho Technical University | 第47-48页 |
| 3.3 Wireless LAN Deployment on HO-Poly Campus | 第48-51页 |
| 3.3.1 Wireless Network Layout for HO-Poly | 第49-51页 |
| 3.4 Tools Used for Wardriving on HO-Poly WLAN | 第51页 |
| 3.5 Machine Setup for Checking Available APs Details on HO-POLY Campus | 第51-52页 |
| 3.5.1 Software Requirement | 第52页 |
| 3.5.2 Hardware Equipment and Specifications | 第52页 |
| 3.6 Tunneling Through the Firewall of HO-POLY via Unsecured (Open) AP | 第52-54页 |
| 3.6.1 Software Requirement | 第52-53页 |
| 3.6.2 Hardware Equipment and Specifications | 第53页 |
| 3.6.3 Steps Involved in Tunneling through HO-POLY Firewall via Unsecured AP | 第53-54页 |
| 3.7 Cracking HO-POLYAP with WEP Security Encryption | 第54-58页 |
| 3.7.1 Software Requirement: | 第54页 |
| 3.7.2 Hardware Equipment and Specifications: | 第54-55页 |
| 3.7.3 Assumptions for WEP Cracking | 第55页 |
| 3.7.4 Steps Involved in Cracking WEP on HO-POLY WLAN | 第55-58页 |
| 3.8 Cracking HO-POLYAP with WPA/WPA2 Security Encryption | 第58-60页 |
| 3.8.1 Software Requirement | 第58页 |
| 3.8.2 Hardware Equipment and Specifications | 第58-59页 |
| 3.8.3 Assumptions for WEP Cracking | 第59页 |
| 3.8.4 Steps Involved in Cracking WPA/WPA2 on HO-POLY WLAN | 第59-60页 |
| 3.9 Decrypting Packets on an Unsecured Access Point Using Wireshark | 第60-62页 |
| CHAPTER FOUR: ANALYSIS AND EVALUATION OF EXPERIMENTALRESULTS | 第62-74页 |
| 4.1 Introduction | 第62页 |
| 4.2 Presentation and Discussion of Experimental Results | 第62-68页 |
| 4.2.1 Results and Discussion of Available APs on HO-POLY Campus | 第62-64页 |
| 4.2.2 Result and Discussion of Open (Unsecured) Access Point | 第64-65页 |
| 4.2.3 Result and Discussion of WEP Configured Access Point | 第65-66页 |
| 4.2.4 Result and Discussion of WPA/WPA2-PSK Configured Access Point | 第66-68页 |
| 4.3 Proposed Solution for HO-POLYWLAN | 第68-69页 |
| 4.4 Seven Key Steps to Prepare for WPA2 Deployment on HO-POLY Campus | 第69-71页 |
| 4.4.1 Security Mechanism and Credentials | 第70页 |
| 4.4.2 User Authentication Database | 第70页 |
| 4.4.3 Client Operating Systems | 第70页 |
| 4.4.4 Supplicants | 第70页 |
| 4.4.5 EAP Types | 第70-71页 |
| 4.4.6 Authentication Server | 第71页 |
| 4.4.7 Access Points and C!ient NIC Cards | 第71页 |
| 4.5 An Example of WPA Deployment Configurations | 第71-74页 |
| 4.5.1 Deploying WPA2 Wireless Encryption in a Windows | 第71-74页 |
| SUMMARY OF FINDINGS,CONCLUSION AND RECOMMENDATION | 第74-76页 |
| REFERENCES | 第76-79页 |
| ACKNOWLEDGEMENTS | 第79-80页 |
| APPENDICES | 第80-81页 |