National Repository of Grey Literature 6 records found  Search took 0.01 seconds. 
Wireless Network Aspects
Vrbovský, Miroslav ; Čulák, Jozef (referee) ; Koch, Miloš (advisor)
My bachelor’s thesis deals with deploying IEEE 802.11 wireless networks. In first, theoretical part my thesis familiarizes the reader with basic terminology, architecture details and 802.11 wireless networking operation fundamentals. In the theoretical part it also discusses modern practices in securing of wireless networks. Practical part contains a wireless network design for company FELS spol s r.o. .
Security Protection efficiency improvement for Wireless Networks
Marušek, Michal ; Burda, Karel (referee) ; Škorpil, Vladislav (advisor)
Nowadays every wireless radio-communication services encompass huge type of technology used for transfer video, voice or data. Wireless communication is the most expanded branch and many companies are using this technology because of low cost and simply management. The biggest advantage is easy connection to shared wireless medium and allows users of network to move around whole covered area. The most expanded types of wireless networks are called Wireless LAN (WLAN). With rising number of WLANs is rising chance to attack shared wireless medium by hacker and many sensitive information can be stolen or modified. To avoid this chance was created the first security protocol used in WLAN called WEP. Its goal was protect data transmitted trough WLAN as strong as were protected in wired networks. Unfortunately WEP was hiding a big weakness which can be used in a crack of WLAN in a minute with the aid of special software. Example of this kid of software can be Airsnort constructed to monitor shared medium and captured every packet transferred trough this medium. Based on statistical method Airsnort can obtain hidden password in a few minutes. The second type of this software can be Aircrack-ng, which can crack hidden password without any user connected to WLAN. Aircrack-ng uses active techniques to generate network load and can obtain password more effectively and faster. The result of both cases was successful and protection of WLAN was completely cracked. Later was created new security protocol called WPA, which had to fix the cryptography weakness of previous WEP. WPA was only temporary security protocol, during standard 802.11 was developing which had to offer highest security and integrity protection of transferred data trough WLAN. For this reasons was created new version of WPA called WPA2 which satisfy requirements of standard 802.11i. Both protocols WPA/WPA2 contain weakness, which can crash security of WLAN. This crack is based on authentication PSK. Attacker during authentication is using information from four-way handshake between user of WLAN and access point. Based on this information attacker can crack password with the aid of password list attack which took approximately 30 minutes. Based on previous result is important to chose strong password contains alphanumeric string or special strings with satisfy length.
Project of WiFi network expansion
Zahradník, Tomáš ; Taševský, Pavel (referee) ; Ondrák, Viktor (advisor)
The Bachelor work deals with the project of WiFi network expansion for VIVO CONNECTION s.r.o. company.
Wireless Network Aspects
Vrbovský, Miroslav ; Čulák, Jozef (referee) ; Koch, Miloš (advisor)
My bachelor’s thesis deals with deploying IEEE 802.11 wireless networks. In first, theoretical part my thesis familiarizes the reader with basic terminology, architecture details and 802.11 wireless networking operation fundamentals. In the theoretical part it also discusses modern practices in securing of wireless networks. Practical part contains a wireless network design for company FELS spol s r.o. .
Project of WiFi network expansion
Zahradník, Tomáš ; Taševský, Pavel (referee) ; Ondrák, Viktor (advisor)
The Bachelor work deals with the project of WiFi network expansion for VIVO CONNECTION s.r.o. company.
Security Protection efficiency improvement for Wireless Networks
Marušek, Michal ; Burda, Karel (referee) ; Škorpil, Vladislav (advisor)
Nowadays every wireless radio-communication services encompass huge type of technology used for transfer video, voice or data. Wireless communication is the most expanded branch and many companies are using this technology because of low cost and simply management. The biggest advantage is easy connection to shared wireless medium and allows users of network to move around whole covered area. The most expanded types of wireless networks are called Wireless LAN (WLAN). With rising number of WLANs is rising chance to attack shared wireless medium by hacker and many sensitive information can be stolen or modified. To avoid this chance was created the first security protocol used in WLAN called WEP. Its goal was protect data transmitted trough WLAN as strong as were protected in wired networks. Unfortunately WEP was hiding a big weakness which can be used in a crack of WLAN in a minute with the aid of special software. Example of this kid of software can be Airsnort constructed to monitor shared medium and captured every packet transferred trough this medium. Based on statistical method Airsnort can obtain hidden password in a few minutes. The second type of this software can be Aircrack-ng, which can crack hidden password without any user connected to WLAN. Aircrack-ng uses active techniques to generate network load and can obtain password more effectively and faster. The result of both cases was successful and protection of WLAN was completely cracked. Later was created new security protocol called WPA, which had to fix the cryptography weakness of previous WEP. WPA was only temporary security protocol, during standard 802.11 was developing which had to offer highest security and integrity protection of transferred data trough WLAN. For this reasons was created new version of WPA called WPA2 which satisfy requirements of standard 802.11i. Both protocols WPA/WPA2 contain weakness, which can crash security of WLAN. This crack is based on authentication PSK. Attacker during authentication is using information from four-way handshake between user of WLAN and access point. Based on this information attacker can crack password with the aid of password list attack which took approximately 30 minutes. Based on previous result is important to chose strong password contains alphanumeric string or special strings with satisfy length.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.