Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Security in Wireless Networks
Post: #1

A plethora of security protocol implementations, for wireless networks, exist today. The various mechanisms and algorithms that are webbed together into current suite of wireless security protocols have serious flaws. Enhancements to the existing protocols in the domain of Wireless Networks are severely needed. Here we analyze the security aspects of existing authentication frameworks for wireless networks, namely 802.11 and 802.1x. The Authentication methods stipulated by 802.11, i.e. Use of SSID, Open Authentication, Shared Key Authentication and Client MAC Verification have their share of vulnerabilities. Although 802.1x supports port based authentication and has key management features, it suffers from lack of Mutual Authentication and Session Hijacking attacks. One way authentication is simply not enough because as only server authenticates the client, the client cannot be sure of the serverâ„¢s identity. We then propose and explain our authentication and security system. We also present a study of RADIUS and EAP Protocols. RADIUS protocol for Authenticator Server and IEEE 802.1x protocol with EAP-TTLS have emerged as our protocols of choice after a comparative study of various protocols mentioned above. RADIUS follows a Client-Server Model and provides network security by the use of a shared secret which is never sent over the network and encryption. EAP is an Authentication Protocol. Its variant EAP-TTLS uses digital certificates and tunneling for User Authentication. Our Mechanism makes use of these protocols and thus provides a robust security solution with strong mutual authentication.
Post: #2
to get information about the topic "wireless networks " full report ppt and related topic refer the link bellow

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: wireless networks and security, eap schools,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Security Analysis of the SASI Protocol computer science topics 2 1,934 21-06-2016 10:30 PM
Last Post: Guest
  projects on computer networks? shakir_ali 2 642 25-01-2016 02:26 PM
Last Post: seminar report asees
Last Post: seminar report asees
  Revisiting Dynamic Query Protocols in Unstructured Peer-to-Peer Networks Projects9 2 604 14-07-2015 02:11 PM
Last Post: seminar report asees
  Security system using IP camera mechanical engineering crazy 5 3,328 16-03-2015 02:52 PM
Last Post: seminar report asees
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 1,303 19-09-2014 12:52 AM
Last Post: [email protected]
  Data Security Using Honey Pot System computer science topics 5 5,495 11-09-2014 07:45 PM
Last Post: erhhk
  Fast Data Collection in Tree-Based Wireless Sensor Networks Projects9 9 3,056 12-03-2014 06:30 PM
Last Post: computer topic
  Folder Security System computer science topics 6 2,610 29-07-2013 11:09 AM
Last Post: computer topic
  Face Recognition Using Artificial Neural Networks nit_cal 2 3,751 20-04-2013 11:25 AM
Last Post: computer topic