Security in Wireless Networks
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Active In SP

Posts: 237
Joined: Oct 2009
29-10-2009, 03:22 PM

A plethora of security protocol implementations, for wireless networks, exist today. The various mechanisms and algorithms that are webbed together into current suite of wireless security protocols have serious flaws. Enhancements to the existing protocols in the domain of Wireless Networks are severely needed. Here we analyze the security aspects of existing authentication frameworks for wireless networks, namely 802.11 and 802.1x. The Authentication methods stipulated by 802.11, i.e. Use of SSID, Open Authentication, Shared Key Authentication and Client MAC Verification have their share of vulnerabilities. Although 802.1x supports port based authentication and has key management features, it suffers from lack of Mutual Authentication and Session Hijacking attacks. One way authentication is simply not enough because as only server authenticates the client, the client cannot be sure of the serverâ„¢s identity. We then propose and explain our authentication and security system. We also present a study of RADIUS and EAP Protocols. RADIUS protocol for Authenticator Server and IEEE 802.1x protocol with EAP-TTLS have emerged as our protocols of choice after a comparative study of various protocols mentioned above. RADIUS follows a Client-Server Model and provides network security by the use of a shared secret which is never sent over the network and encryption. EAP is an Authentication Protocol. Its variant EAP-TTLS uses digital certificates and tunneling for User Authentication. Our Mechanism makes use of these protocols and thus provides a robust security solution with strong mutual authentication.

.pdf   Security in Wireless Networks.pdf (Size: 271.61 KB / Downloads: 63)
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Switching and Traffic Grooming in WDM Networks at java project topics 3 974 09-09-2016, 02:27 PM
Last Post: Dhanabhagya
  Implementation of ATM Security by Using Fingerprint recognition and GSM seminar tips 1 815 01-04-2016, 04:08 PM
Last Post: mkaasees
  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing PPT project girl 1 1,027 21-10-2015, 01:52 PM
Last Post: Guest
  The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks seminar flower 3 2,769 09-12-2014, 09:25 PM
Last Post: Guest
  SECURITY SYSTEM FOR DNS USING CRYPTOGRAPHY ppt project girl 5 2,531 10-06-2014, 11:39 AM
Last Post: java projects
  Detection and Localization of Multiple Spoofing Attackers in Wireless Networks seminar flower 4 1,822 02-06-2014, 09:51 AM
Last Post: seminar project topic
  Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees Abstract seminar projects maker 2 777 08-03-2014, 12:43 PM
Last Post: seminar project topic
  Wireless Sensor Network Security model using Zero Knowledge Protocol project uploader 1 1,057 28-02-2014, 01:44 AM
Last Post: mspadmini19
  Identifying Evolving Groups in Dynamic Multimode Networks Projects9 2 1,151 30-09-2013, 10:54 AM
Last Post: Guest
  Web based java compiler online with security access Report seminar projects maker 0 546 27-09-2013, 02:14 PM
Last Post: seminar projects maker