Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Wireless Fidelity Networks). Showing records 1 – 3 of 3 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


University of the Western Cape

1. Saay, Mohammad Salim. Toward Authentication Mechanisms for Wi-Fi Mesh Networks .

Degree: 2011, University of the Western Cape

Wi-Fi authentication mechanisms include central authentication, dynamic and distributed authentication and some encryption methods. Most of the existing authentication methods were designed for single-hop networks, as opposed to multihop Wi-Fi mesh networks. This research endeavors to characterize and compare existing Wi-Fi authentication mechanisms to find the best secure connection mechanism associated with Wi-Fi mesh network fragmentation and distributed authentication. The methodology is experimental and empirical, based on actual network testing. This thesis characterizes five different types of Wrt54gl firmware, three types of Wi-Fi routing protocols, and besides the eight Wi-Fi mesh network authentication protocols related to this research, it also characterizes and compares 14 existing authentication protocols. Most existing authentication protocols are not applicable to Wi-Fi mesh networks since they are based on Layer 2 of the OSI model and are not designed for Wi-Fi mesh networks. We propose using TincVPN which provides distributed authentication, fragmentation, and can provide secure connections for backbone Wi-Fi mesh networks. Advisors/Committee Members: Tucker, William D (advisor).

Subjects/Keywords: Wi-Fi mesh networks; Wireless fidelity (Wi-Fi); TincVPN

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Saay, M. S. (2011). Toward Authentication Mechanisms for Wi-Fi Mesh Networks . (Thesis). University of the Western Cape. Retrieved from http://hdl.handle.net/11394/5275

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Saay, Mohammad Salim. “Toward Authentication Mechanisms for Wi-Fi Mesh Networks .” 2011. Thesis, University of the Western Cape. Accessed October 21, 2018. http://hdl.handle.net/11394/5275.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Saay, Mohammad Salim. “Toward Authentication Mechanisms for Wi-Fi Mesh Networks .” 2011. Web. 21 Oct 2018.

Vancouver:

Saay MS. Toward Authentication Mechanisms for Wi-Fi Mesh Networks . [Internet] [Thesis]. University of the Western Cape; 2011. [cited 2018 Oct 21]. Available from: http://hdl.handle.net/11394/5275.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Saay MS. Toward Authentication Mechanisms for Wi-Fi Mesh Networks . [Thesis]. University of the Western Cape; 2011. Available from: http://hdl.handle.net/11394/5275

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

2. Fernandez, Jean Eli Cerrillo. A cognitive mechanism for vertical handover and traffic steering to handle unscheduled evacuations of the licensed shared access band.

Degree: 2017, Universidade do Rio Grande do Sul

There has been a steady growth in the traffic generated by Mobile Network Operators (MNOs), and by 2020 it is expected to overload the existing licensed spectrum capacity and lead to the problem of scarce resources. One method to deal with this traffic overload is to access unlicensed and shared spectrum bands using an opportunistic approach. The use of Licensed Shared Access (LSA) is a novel approach for spectrum sharing between the incumbent user (i.e., the current owner of the shared spectrum) and the LSA licensee (i.e., the temporary user of frequencies, such as an MNO). The LSA system allows the incumbent users to temporarily provide the LSA licensee with access to its spectrum resources. However, licensees must adopt vertical handover and traffic steering procedures to vacate their customers from the LSA band without causing interference, whenever this is required by the incumbent. These procedures should be carried out, de facto, before the base station is turned off as a part of a rapid release of unscheduled LSA band facing evacuation scenarios. Thus, in this dissertation, a cognitive mechanism is proposed to make decisions in advance to find the best target network(s) for evacuated customers in connected mode and with active traffic per class of service. On the basis of these decisions, the vertical handover and traffic steering procedures are carried out for the best target network(s), which are selected in advance and undertaken immediately to avoid interference between the licensee and incumbent services. Furthermore, this guarantees the seamless connectivity and QoS of evacuated customers and their traffic respectively, during and after the unscheduled evacuation scenarios. A performance evaluation conducted in a simulating scenario consisting of one LTE-LSA and three Wi-Fi networks, demonstrated that the proposed solution could be completed within the time required for the unscheduled evacuation, as well as, being able to ensure the QoS and seamless connectivity of the evacuees. The total execution time obtained during the performance evaluation of the proposed solution was around 46% faster than of two related works and could thus avoid interference between the licensee and incumbent services. Advisors/Committee Members: Rochol, Juergen.

Subjects/Keywords: Redes : Computadores; Cognitive Mechanism; Seguranca : Redes : Computadores; Wireless-Fidelity Networks; Long-Term Evolution Networks; Unscheduled Evacuation; Licensed Shared Access; Mobile Network Operators; Spectrum Sharing; Traffic Steering; Vertical Handover; In-Advance Decisions

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fernandez, J. E. C. (2017). A cognitive mechanism for vertical handover and traffic steering to handle unscheduled evacuations of the licensed shared access band. (Thesis). Universidade do Rio Grande do Sul. Retrieved from http://hdl.handle.net/10183/169331

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fernandez, Jean Eli Cerrillo. “A cognitive mechanism for vertical handover and traffic steering to handle unscheduled evacuations of the licensed shared access band.” 2017. Thesis, Universidade do Rio Grande do Sul. Accessed October 21, 2018. http://hdl.handle.net/10183/169331.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fernandez, Jean Eli Cerrillo. “A cognitive mechanism for vertical handover and traffic steering to handle unscheduled evacuations of the licensed shared access band.” 2017. Web. 21 Oct 2018.

Vancouver:

Fernandez JEC. A cognitive mechanism for vertical handover and traffic steering to handle unscheduled evacuations of the licensed shared access band. [Internet] [Thesis]. Universidade do Rio Grande do Sul; 2017. [cited 2018 Oct 21]. Available from: http://hdl.handle.net/10183/169331.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fernandez JEC. A cognitive mechanism for vertical handover and traffic steering to handle unscheduled evacuations of the licensed shared access band. [Thesis]. Universidade do Rio Grande do Sul; 2017. Available from: http://hdl.handle.net/10183/169331

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

3. Ross, David Andrew. Securing IEEE 802.11 wireless LANs.

Degree: 2010, Queensland University of Technology

As the acceptance and popularity of wireless networking technologies has proliferated, the security of the IEEE 802.11 wireless local area network (WLAN) has advanced in leaps and bounds. From tenuous beginnings, where the only safe way to deploy a WLAN was to assume it was hostile and employ higherlayer information security controls, to the current state of the art, all manner of improvements have been conceived and many implemented. This work investigates some of the remaining issues surrounding IEEE 802.11 WLAN operation. While the inherent issues in WLAN deployments and the problems of the original Wired Equivalent Privacy (WEP) provisions are well known and widely documented, there still exist a number of unresolved security issues. These include the security of management and control frames and the data link layer protocols themselves. This research introduces a novel proposal to enhance security at the link layer of IEEE 802.11 WLANs and then conducts detailed theoretical and empirical investigation and analysis of the eects of such proposals. This thesis �rst de�nes the state of the art in WLAN technology and deployment, including an overview of the current and emerging standards, the various threats, numerous vulnerabilities and current exploits. The IEEE 802.11i MAC security enhancements are discussed in detail, along with the likely outcomes of the IEEE 802.11 Task Group W1, looking into protected management frames. The problems of the remaining unprotected management frames, the unprotected control frames and the unprotected link layer headers are reviewed and a solution is hypothesised, to encrypt the entire MAC Protocol Data Unit (MPDU), including the MAC headers, not just the MAC Service Data Unit (MSDU) commonly performed by existing protocols. The proposal is not just to encrypt a copy of the headers while still using cleartext addresses to deliver the frame, as used by some existing protocols to support the integrity and authenticity of the headers, but to pass the entire MPDU only as ciphertext to also support the con�dentiality of the frame header information. This necessitates the decryption of every received frame using every available key before a station can determine if it is the intended recipient. As such, this raises serious concerns as to the viability of any such proposal due to the likely impact on throughput and scalability. The bulk of the research investigates the impacts of such proposals on the current WLAN protocols. Some possible variations to the proposal are also provided to enhance both utility and speed. The viability this proposal with respect to the eect on network throughput is then tested using a well known and respected network simulation tool, along with a number of analysis tools developed speci�cally for the data generated here. The simulator's operation is �rst validated against recognised test outputs, before a comprehensive set of control data is established, and then the proposal is tested and and compared against the controls. This detailed analysis of the…

Subjects/Keywords: 802.11, IEEE 802.11, 802.11i, 802.11w, wireless, wireless LAN, WLAN, wireless networks, network security, information security, data security, privacy, Wired Equivalent Privacy, WEP, Wireless Ethernet Compatibility Alliance, WECA; Wireless Fidelity Alliance, Wi-Fi, Wi-Fi Protected Access, WPA, WPA2, Temporal Key Integrity Protocol, TKIP, CCMP, transition security network, TSN, robust security network, RSN, robust security network association, RSNA, data link, link layer, MPDU, PSDU; address encryption, pervasive, ubiquitous

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ross, D. A. (2010). Securing IEEE 802.11 wireless LANs. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/37638/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ross, David Andrew. “Securing IEEE 802.11 wireless LANs.” 2010. Thesis, Queensland University of Technology. Accessed October 21, 2018. https://eprints.qut.edu.au/37638/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ross, David Andrew. “Securing IEEE 802.11 wireless LANs.” 2010. Web. 21 Oct 2018.

Vancouver:

Ross DA. Securing IEEE 802.11 wireless LANs. [Internet] [Thesis]. Queensland University of Technology; 2010. [cited 2018 Oct 21]. Available from: https://eprints.qut.edu.au/37638/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ross DA. Securing IEEE 802.11 wireless LANs. [Thesis]. Queensland University of Technology; 2010. Available from: https://eprints.qut.edu.au/37638/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.