A Study of Security Protocols for Wireless Local Area Network

MIST Central Library Repository

Show simple item record

dc.contributor.author Nawshin, Ishrat Jahan
dc.contributor.author Jyoti, Sharmin Jahan
dc.contributor.author Zeba, Shamme Akter
dc.date.accessioned 2015-06-30T06:00:09Z
dc.date.available 2015-06-30T06:00:09Z
dc.date.issued 2014-12
dc.identifier.uri http://hdl.handle.net/123456789/131
dc.description We are thankful to Almighty Allah for his blessings for the successful completion of our thesis. Ourheartiestgratitude,profoundindebtednessanddeeprespectgotooursupervisor, Md. ShohrabHossain,AssistantProfessor,DepartmentofComputerScienceandEngineering, Bangladesh University of Engineering and Technology, Dhaka-1000, Bangladesh, for his constant supervision, affectionate guidance and great encouragement and motivation. His keen interest on the topic and valuable advices throughout the study was of great help in completing thesis.We also grateful to our reviewer Jahidul Arafat, Lecturer, CSE Dept, MIST. We are especially grateful to the Department of Computer Science and Engineering (CSE) of Military Institute of Science and Technology (MIST) for providing their all out support during the thesis work. Finally, we would like to thank our families and our course mates for their appreciable assistance, patience and suggestions during the course of our thesis. en_US
dc.description.abstract Wireless Local Area Networks (WLANs) have become more prevalent and are widely deployed and used in many popular places like university campuses, airports, residences, cafes etc. With this growing popularity, the security of wireless network is also very important. In this study we present the security mechanisms available for WLANs. These security mechanisms are Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and 802.11i (WPA2).Our aim is to show how an attack can be made on systems using the above mentioned mechanisms. We have given a brief overview of their working, structure, algorithms used and have tried to explore the real timevulnerabilitiesbyissuingsuccessfulattacksagainstWEPandWPA2network. The attacks were done in an ad-hoc network, using three laptops with wi-fi facility. We begin with WEP protocol which employs a flawed RC4 algorithm is very much prone to attack and is easily crackable, then listing some of its weakness. Then we have a look on WPA as the enhanced standard of WEP, along with some flaws in it. Finally an attack on WPA is explained. CommView version 6.3 and Aircrack-ng 1.2 RC 1 are the tools (software) those we have used to launch the attacks. The process required for attacking are explained, along with the screen-shots to help understand the working. en_US
dc.description.sponsorship Department of Computer Science and Engineering, Military Institute of Science and Technology en_US
dc.language.iso en en_US
dc.publisher Department of Computer Science and Engineering, Military Institute of Science and Technology en_US
dc.relation.ispartofseries B.Sc. in Computer Science and Engineering Thesis;
dc.subject Security, Protocols, Wireless, Local Area Network en_US
dc.title A Study of Security Protocols for Wireless Local Area Network en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account