
- 100 pages
- English
- PDF
- Available on iOS & Android
About this book
Bachelor Thesis from the year 2006 in the subject Computer Science - Internet, New Technologies, grade: 1, 7, University of Wales, North East Wales Institute, Wrexham, Großbritannien (University of Wales, North East Wales Institute, Wrexham, Großbritannien), language: English, abstract: This paper addresses the theory and reality of Wi-Fi security. It provides an overview of security mechanisms and explains how security works in wireless networks. The most important security protocols that are relevant for small office or home office environments are looked upon in more detail. The security of a real-world wireless network is being tested with freely available tools and popular attacking methods. It is demonstrated that old security protocols can no longer be seen as being secure at all. To create a holistic view the idea of Wi-Fi security is then expanded to include the physical level. A series of experiments provides insight on how to make a network more secure with materials and tools available in every household. A WLAN that is nearly unreachable outside the perimeter does not attract any potential hackers. The paper concludes with recommendations on where to place your access point and what can be done to shield it.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- I. Acknowledgements
- II. Contents
- III. List of figures
- IV. List of abbreviations
- V. Abstract
- 1. Introduction
- 2. Literature review
- 3. Methodology
- 4. WLAN Basics
- 5. Security
- 6. Wireless LAN penetration test – an experiment
- 7. Physical Layer Security
- 8. Experiments
- 9. Critical Evaluation
- 10. Conclusion
- 11. References
- 12. Bibliography
- 13. Appendices
- A 1. Project organization related
- A 2. Information gathering related
- A 3. Physical Layer related