National Repository of Grey Literature 74 records found  previous11 - 20nextend  jump to record: Search took 0.01 seconds. 
802.1X Based Wireless Network Security Audit
Antal, Lukáš ; Samek, Jan (referee) ; Drozd, Michal (advisor)
This term project analyzes the security of 802.1X based wireless networks and presents the methodology for auditing these networks. The thesis describes various methods of the EAP authentication protocol used in wireless networks, security risks arising from their usage and recommendations for mitigating these risks. The paper also includes implementation of applications for 802.1X based wireless network audit focusing on the EAP protocol processing.
Wireless Network Aspects
Vrbovský, Miroslav ; Čulák, Jozef (referee) ; Koch, Miloš (advisor)
My bachelor’s thesis deals with deploying IEEE 802.11 wireless networks. In first, theoretical part my thesis familiarizes the reader with basic terminology, architecture details and 802.11 wireless networking operation fundamentals. In the theoretical part it also discusses modern practices in securing of wireless networks. Practical part contains a wireless network design for company FELS spol s r.o. .
Wireless model 802.11 in NS2
Botta, Miroslav ; Kubánková, Anna (referee) ; Šimek, Milan (advisor)
Theme of this work is simple wireless simulation Network Simulation 2 tool. The work consists of more parts. In the first section is basic theory about Wi-Fi networks, they types and standards and describes how useful can it be in practical life. In the second section there is a short annotation for programming in TCL language and possibilities of NS2 for simulating wireless networks. In the end there is a complex simulation of this network. In the third part there are two complex tasks where the information’s are drawn from the previous two parts.
Security Analysis of WiFi Networks
Butela, Michal ; Malinka, Kamil (referee) ; Cvrček, Daniel (advisor)
This document provides overview of commonly used standards and mechanisms for securing the wireless network based on Wi-Fi protocol. It is covering all important security areas including confidentiality, integrity and authentication. We can find here also detailed analysis and description of functionality of listed mechanisms. Description of possible attacks against listed security mechanisms. There is a measurement of influence of encryption to transfer speed in the another section. It's followed by attacks against particular security mechanisms. And finally, description of deployment of central authentication system.
Optimization of access networks for multimedia services
Slavíček, Tomáš ; Reichert, Pavel (referee) ; Šporik, Jan (advisor)
This thesis describes the problems of access networks and their existing types. It discusses the important parameters for multimedia services. It considers the possibility of using various networks at the localities. It presents modern multimedia services and their requirements for access networks. Next step describes the possible use of QoS to optimize access networks used for multimedia services. Multimedia services to different types of networks and limits which these types of networks have, are simulated in the program Opnet Modeler. Measurements of values important for securing quality of services are implemented at selected real access networks. In conclusion, the results of simulations and measurements are subjected to comparative analysis.
Analysis of Cryptographic Algorithms 802.11
Vojtíšek, Jindřich ; Sobek, Jiří (referee) ; Novotný, Bohumil (advisor)
This work deals with wireless standard 802.11, primaly about security algorithms used in them. Further there is made analysis of algorithms WEP, WPA and WPA2. This algorithms are described how coding by them works and for easier understandig are added block schemes of their principles. In practical part is realized algorithms WEP, WPA and WPA2 in program Matlab simulink. Model is complemented by graphs which shows how data changes when comming throught this systems.
Black-Box Analysis of Wi-Fi Stacks Security
Venger, Adam ; Orsák, Michal (referee) ; Malinka, Kamil (advisor)
Zariadenia, na ktoré sa každodenne spoliehame, sú stále zložitejšie a využívajú zložitejšie protokoly. Jedným z týchto protokolov je Wi-Fi. S rastúcou zložitosťou sa zvyšuje aj potenciál pre implementačné chyby. Táto práca skúma Wi-Fi protokol a použitie fuzz testingu pre generovanie semi-validných vstupov, ktoré by mohli odhaliť zraniteľné miesta v zariadeniach. Špeciálna pozornosť bola venovaná testovaniu Wi-Fi v systéme ESP32 a ESP32-S2. Výsledkom práce je fuzzer vhodný pre testovanie akéhokoľvek Wi-Fi zariadenia, monitorovací nástroj špeciálne pre ESP32 a sada testovacích programov pre ESP32. Nástroj neodhalil žiadne potenciálne zraniteľnosti.
QoS optimization and modern communication services delay analysis
Novák, Přemek ; Škorpil, Vladislav (referee) ; Endrle, Pavel (advisor)
This thesis consists of theoretical and practical parts. The theoretical part contains an analysis of the problems of wireless networkssolutions individual standards and methodologies to ensure quality of service. In the practical part using the OPNET Modeler, a number of different simulation models and their evaluation. It is a model of individual standards, support mobility and interference effects on quality of service.
Security Protection efficiency improvement for Wireless Networks
Marušek, Michal ; Burda, Karel (referee) ; Škorpil, Vladislav (advisor)
Nowadays every wireless radio-communication services encompass huge type of technology used for transfer video, voice or data. Wireless communication is the most expanded branch and many companies are using this technology because of low cost and simply management. The biggest advantage is easy connection to shared wireless medium and allows users of network to move around whole covered area. The most expanded types of wireless networks are called Wireless LAN (WLAN). With rising number of WLANs is rising chance to attack shared wireless medium by hacker and many sensitive information can be stolen or modified. To avoid this chance was created the first security protocol used in WLAN called WEP. Its goal was protect data transmitted trough WLAN as strong as were protected in wired networks. Unfortunately WEP was hiding a big weakness which can be used in a crack of WLAN in a minute with the aid of special software. Example of this kid of software can be Airsnort constructed to monitor shared medium and captured every packet transferred trough this medium. Based on statistical method Airsnort can obtain hidden password in a few minutes. The second type of this software can be Aircrack-ng, which can crack hidden password without any user connected to WLAN. Aircrack-ng uses active techniques to generate network load and can obtain password more effectively and faster. The result of both cases was successful and protection of WLAN was completely cracked. Later was created new security protocol called WPA, which had to fix the cryptography weakness of previous WEP. WPA was only temporary security protocol, during standard 802.11 was developing which had to offer highest security and integrity protection of transferred data trough WLAN. For this reasons was created new version of WPA called WPA2 which satisfy requirements of standard 802.11i. Both protocols WPA/WPA2 contain weakness, which can crash security of WLAN. This crack is based on authentication PSK. Attacker during authentication is using information from four-way handshake between user of WLAN and access point. Based on this information attacker can crack password with the aid of password list attack which took approximately 30 minutes. Based on previous result is important to chose strong password contains alphanumeric string or special strings with satisfy length.
Providing IP mobility in Wi-Fi and Wi-Max environment
Klügl, Richard ; Novotný, Vít (referee) ; Skořepa, Michal (advisor)
The bachelor´s thesis is focused on wireless networks within the context of providing support of IP mobility for these networks. This document consists of two main parts, the theoretical part and the practical part. The first one at the beginning includes simple characteristics and classification of wireless networks. Then it is followed by description of actual new trends in wireless networks, focused on the WiMAX technology (IEEE 802.16). At the end of this part is introduced the technology of mobile IPv4 address provided by the MIPv4 protocol. The second main part of the bachelor´s thesis deals with the practical implementation of the MIPv4 protocol into the Wi-Fi and WiMAX environment. For this object is used the OPNET Modeler 14.0 simulation environment, in which are made three network models of these technologies. This simulation shows function of the basic mechanisms of the MIPv4 protocol and reports which of these models have the best performance for supporting VoIP communication.

National Repository of Grey Literature : 74 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.