National Repository of Grey Literature 58 records found  previous11 - 20nextend  jump to record: Search took 0.00 seconds. 
Analysis of Cryptographic Algorithms 802.11
Vojtíšek, Jindřich ; Sobek, Jiří (referee) ; Novotný, Bohumil (advisor)
This work deals with wireless standard 802.11, primaly about security algorithms used in them. Further there is made analysis of algorithms WEP, WPA and WPA2. This algorithms are described how coding by them works and for easier understandig are added block schemes of their principles. In practical part is realized algorithms WEP, WPA and WPA2 in program Matlab simulink. Model is complemented by graphs which shows how data changes when comming throught this systems.
Security Protection efficiency improvement for Wireless Networks
Marušek, Michal ; Burda, Karel (referee) ; Škorpil, Vladislav (advisor)
Nowadays every wireless radio-communication services encompass huge type of technology used for transfer video, voice or data. Wireless communication is the most expanded branch and many companies are using this technology because of low cost and simply management. The biggest advantage is easy connection to shared wireless medium and allows users of network to move around whole covered area. The most expanded types of wireless networks are called Wireless LAN (WLAN). With rising number of WLANs is rising chance to attack shared wireless medium by hacker and many sensitive information can be stolen or modified. To avoid this chance was created the first security protocol used in WLAN called WEP. Its goal was protect data transmitted trough WLAN as strong as were protected in wired networks. Unfortunately WEP was hiding a big weakness which can be used in a crack of WLAN in a minute with the aid of special software. Example of this kid of software can be Airsnort constructed to monitor shared medium and captured every packet transferred trough this medium. Based on statistical method Airsnort can obtain hidden password in a few minutes. The second type of this software can be Aircrack-ng, which can crack hidden password without any user connected to WLAN. Aircrack-ng uses active techniques to generate network load and can obtain password more effectively and faster. The result of both cases was successful and protection of WLAN was completely cracked. Later was created new security protocol called WPA, which had to fix the cryptography weakness of previous WEP. WPA was only temporary security protocol, during standard 802.11 was developing which had to offer highest security and integrity protection of transferred data trough WLAN. For this reasons was created new version of WPA called WPA2 which satisfy requirements of standard 802.11i. Both protocols WPA/WPA2 contain weakness, which can crash security of WLAN. This crack is based on authentication PSK. Attacker during authentication is using information from four-way handshake between user of WLAN and access point. Based on this information attacker can crack password with the aid of password list attack which took approximately 30 minutes. Based on previous result is important to chose strong password contains alphanumeric string or special strings with satisfy length.
Current trends in the security of Wi-Fi IEEE 802.11 networks
Blažek, Ondřej ; Škorpil, Vladislav (referee) ; Endrle, Pavel (advisor)
This work describes security options of 802.11 standard. Principle of WEP algorithm is described here, problem with his inicialization vector which leads to a statistical attack and revelation of his secret key. Moreover other principles of algorithms such as WPA, WPA2 are explained here along with a practical demonstration of bruteforce attack in a practical part of the thesis. Also the influence of encryption on network throughput is tested here using tool Iperf.
Attacks on Standard 802.11
Burian, Vojtěch ; Horváth, Tomáš (referee) ; Novotný, Bohumil (advisor)
Thesis is concerned about standard 802.11 especially wireless network security in historical and in current way. First part is focused on WEP secured wireless network problematics. Consequently, in different point of view we are focused on network security which was developed recently, for example WPA and WPA2 security. It will be marked the basic functioning and brief overview of standard 802.11, introduction to the known attacks on wireless network security and also indicate the main mistakes. Many older devices have only WEP security. Therefore, in this thesis is designed better and more coherent system of security of the WEP protocol. As well modern methods of security WPA and WPA2 are included. Second part is focused on the simulation of attack on security networks. In this part the problematic with beaking security WEP, WPA and WPA2 is discussed.
Analysis of Security for Wireless Networks Using Mobile Device
Líška, Tomáš ; Malinka, Kamil (referee) ; Aron, Lukáš (advisor)
This bachelor's thesis deals with analysis of security for wireless networks using mobile device, where application is created for Android operating system. Application launchs promiscuous mode for wireless card and scans wireless networks in range. There is a possibility to analyze security of these networks. This work describes wireless networks security theory, proposal and implementation. This work also describes problems with analysis and evaluates the final results.
Security of wireless computer networks IEEE 802.11
Škodák, Jaroslav ; Jeřábek, Jan (referee) ; Koutný, Martin (advisor)
This work describes available and used standards, protocols and mechanisms used to secure IEEE 802.11 wireless networks. In the next section are listed vulnerabilities and possible attacks against different types of security. The principles of individual attacks on authentication, WEP security and WPA/WPA2 personal mode are described and realized using various software especially linux program aircrack-ng. Password for WEP security is obtained by passive eavesdropping data, using ARP replay injection and by creating own frames. The last two methods are used to generate traffic on the network, which is captured and then used to derive the WEP password. By injecting ARP frames, password was found in the number 60 000 captured frames and about 180 000 frames of data was needed for passive method. Decryption of WEP frame was done by fragment and KoreK chopchop attacks. This decrypted frame could be used to create fake frames and obtain WEP password. Brute force attack is realized for security WPA (WPA2) personal mode (often due to lack of strong password) by comparing password (passphrase) from password list. Speed of comparing is about 200 passwords/s.
Android App for Security Monitoring of Communication
Klepáčková, Karolína ; Dobeš, Petr (referee) ; Herout, Adam (advisor)
This diploma thesis is focused on implementation of application for security monitoring of network communication of other applications in mobile device with Android platform. Provides users information about security risks that may harm his/her privacy or device. It uses a local VPN to tunnel all data sent to the wireless network. These can be linked to an application that has sent them because the Android kernel is derived from the Linux kernel and can be used to retrieve information about established network connections and the application identifier associated with the connection. This mapping allows to get more information about an app that is potentially dangerous for your mobile device.
802.11 standard security techniques and their features
Endrle, Pavel ; Pust, Radim (referee) ; Pfeifer, Václav (advisor)
This master´s thesis is about 802.11 standard security techniques and their features. Particular types of this standard and its features are shown in the introduction. Wireless network security cypher alghoritm types, their features, weaknesses and principles of functions are closely described in next few chapters. Realized attacks on these security alghoritms with their principles are described and shown in the practical part of thesis. One chapter is about effectivity, accessibility and practicability valorization of these attacks in practice.
Wireless Network
Šumaj, Boris ; Janováč, Dušan (referee) ; Koch, Miloš (advisor)
The content of this thesis is to illuminate the basic issues of wireless networks. It gives an overview of IEEE 802.11 standards. I´ll analyze these standards with special emphasis on their security and architecture. The next step will be the subsequent creation of a secure corporate network according to the established facts of a particular company.
A new security model implemented in the metropolitan network
Dančuk, Michal ; Kyselák, Martin (referee) ; Škorpil, Vladislav (advisor)
This diploma thesis deals with wireless computer networks in a point of view security. It contains security principles and standards used in these networks. It shows failings of old security methods in contras of new standards. The result of the thesis is a design of the metropolitan network and its realization. In this network appropriate solutions of security are used. The last part of the thesis deals with a design of web applications created in the PHP programming language and SQL database system.

National Repository of Grey Literature : 58 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.