Browse By Repository:

 
 
 
   

Measurement And Comparison Between Wireless Network Security (MAC, Address Filtering, EAP-TTLS, PEAP-MSCHAPv2 (IPsec) )

Mohammad Yusof, Abu Bakar (2011) Measurement And Comparison Between Wireless Network Security (MAC, Address Filtering, EAP-TTLS, PEAP-MSCHAPv2 (IPsec) ). Project Report. UTeM, Melaka, Malaysia. (Submitted)

[img] PDF (24 pages)
Measurement_And_Comparison_Between_Wireless_Network_Security_(MAC,_Address_Filtering,_EAP-TTLS,_Peap-MSCHAPv2_(IPsec)_)_-_24_pages.pdf - Submitted Version

Download (387kB)
[img] PDF (Full Text)
Measurement_And_Comparison_Between_Wireless_Network_Security_(MAC,_Address_Filtering,_EAP-TTLS,_Peap-MSCHAPv2_(IPsec)_).pdf - Submitted Version
Restricted to Registered users only

Download (3MB)

Abstract

Wireless network refers to all types of computer networks that are not ted by any type of cable. The IEEE specifies the 802.11 standards are used for ss LANs technologies. A wireless local area network (WLAN) links two or evices use a wireless (radio) and typically provides wireless connectivity h an access point to the wider Internet. This gives users mobility to move the local coverage area and still be connected to the network. Wireless logy also has advantages and disadvantages. The advantage of wireless is that entation of low cost, flexible, ideal for places is not reasonable and so forth. eakness of the wireless connection is lower speed compared to wired networks, ex configurations of cable networks and less secure. This project is specifically reless network security. This means, how to protect wireless networks from orized users. There are many types of wireless authentication can be shed. This project will use the Remote Authentication Dial In User Service US) networking protocol. In addition, 802.1x authentications are also ed and it have concept of the three parties representing the supplicant, an ticator and authentication server. There are three types of wireless tication will be used for the project, which is the MAC address filtering, EAP­ and PEAP-MSCHAPv2 (IPsec). The objective of the project is to study, re and analyze the performance of the wireless authentication process. The of these objectives will be used to select the most appropriate authentication d for wireless.

Item Type: Final Year Project (Project Report)
Uncontrolled Keywords: Wireless LANs, Wireless communication systems -- Security measures
Subjects: T Technology > T Technology (General)
T Technology > TK Electrical engineering. Electronics Nuclear engineering
Divisions: Library > Final Year Project > FTMK
Depositing User: Users 136 not found.
Date Deposited: 10 Oct 2012 00:53
Last Modified: 28 May 2015 03:40
URI: http://digitalcollection.utem.edu.my/id/eprint/6150

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year