Security System for Ad-hoc Wireless Networks

Security System for Ad-hoc Wireless Networks based on Generic Secure Objects Matei Ciobanu Morogan 2005 Ph.D. Thesis Kungliga Tekniska Högskolan Submitted as the partial fulfillment of requirements for the degree of Doctor of Philosophy at the Department of Computer and System Sciences, Kungliga Tekniska Högskolan Department of Computer and Systems Sciences Doctoral Dissertation Department of Computer and System Sciences Stockholm University / Royal Institute of Technology ISBN 91-7178-019-X i Abstract As computing devices and wireless connectivity become ubiquitous, new usage scenarios emerge, where wireless communication links between mobile devices are established in an ad-hoc manner. The resulting wireless ad-hoc networks differ from classical computer networks in a number of ways, lack of permanent access to the global network and heterogeneous structure being some of them. Therefore, security services and mechanisms that have been designed for classical computer networks are not always the optimal solution in an ad-hoc network environment. The research is focused on analyzing how standard security services that are available in classical networks can be provided in an ad-hoc wireless network environment. The goal is to design a security system optimized for operation in ad-hoc wireless networks that provides the same security services -

  • Word count: 43019
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

The Challenges of Network Security

The Challenges of Network Security Remediation at a Regional University A thesis presented to the faculty of the Department of Computer and Information Sciences East Tennessee State University In partial fulfillment of the requirements for the degree Master of Science in Computer Science by William R. Simons May 2005 Dr. Qing Yuan, Chair Dr. Phillip Pfeiffer Mr. Steven Jenkins Keywords: computer, system security, network security, security audit, security hardening, vulnerability, remediation, Nessus, Nmap 2 ABSTRACT The Challenges of Network Security Remediation at a Regional University by William R. Simons This thesis describes challenges encountered during a year-long effort to improve the security of the 3,300 node administrative computer network at East Tennessee State University. The key remediation strategies used included employing the vulnerability scanner Nessus to profile the network, analyzing the scan results, and attempting to remove the most critical vulnerabilities found. The project succeeded in decreasing known "high" criticality vulnerabilities on campus by 26.1%, and confirmed four standard observations about the challenges of network administration: Vulnerability scanning is a lengthy task best performed in parallel and supported by automated data analysis. Securing a network is like trying to hit a moving target, due to an

  • Word count: 25338
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

The intention of this study is to analyze and explore the emerging field of grid technology. It delves into how the grid is being used to enhance the capabilities of existing distributed systems and data resources.

Issues and Applications of Grid Computing A thesis submitted in partial fulfillment of the requirements for the degree of Bachelor of Science (Computer Science) ABSTRACT The intention of this study is to analyze and explore the emerging field of grid technology. It delves into how the grid is being used to enhance the capabilities of existing distributed systems and data resources. The characteristics of virtual organizations and their participation in implementing a grid structure are observed. The issues surfacing in grid implementation and their possible solutions are discussed. Enhancements and modifications are proposed for existing frameworks for database integration with the grid. A basic grid structure for the Department of Computer Science, University of Karachi has been planned out. The Globus Toolkit, used in grid middleware is tested and run on available resources. TABLE OF CONTENTS ACKNOWLEDGEMENTS v ABSTRACT vi TABLE OF CONTENTS vii LIST OF FIGURES viii LIST OF TABLES viii FUNDAMENTALS OF GRID COMPUTING 1 GRID APPLICATIONS 9 THE GRID ARCHITECTURE 18 ISSUES IN GRID COMPUTING 42 DATABASES AND THE GRID 50 PROPOSED GRID DEVELOPMENT FOR THE UNIVERSITY OF KARACHI 66 CONCLUSIONS 70 OVERVIEW OF GRAM 72 OVERVIEW OF MDS 73 OVERVIEW OF GRIDFTP 74 STARTING GRAM 89 REFERENCES 92 97 LIST OF FIGURES Figure 1.1: Virtual Organizations 6 Figure 2.2: The

  • Word count: 21063
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Human Computer Interaction Project.

Human Computer Interaction Project Evaluation of Olympus C1400l Digital Camera Group Members: Lorna Brodbin 9838635 Jean Cronin 9838856 Gillian O'Sullivan 9840435 . Introduction "Every picture tells a story" An old saying that holds true. A picture can tell us more in an instant than a thousand words ever could. A picture records emotions, expressions, feelings and conveys them easily to the onlooker. Photographs capture hundreds of years of history be it on a world scale or at a personal level. We capture our weddings, births, birthdays and other occasions dear to us on camera because we want to hold on to that moment forever. Every time we look at a photograph we remember that day and relive that moment. The camera never lies. It takes a moment in time and freezes it. We rely on photographs as a tool to help us to understand and to remember the history of the world. Most of the worlds great historical events have been captured on film. A photograph of an innocent victim of war makes the victim real, like someone we knew rather than a name in a paper, and touches us far more deeply than stories in a book. Peoples descriptions of events are often tainted by exaggeration, imperfect memories and personal opinions but there is no denying the evidence of a photograph. The camera has come along way since the days of Niepcei. The first cameras were big and

  • Word count: 16745
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

The purpose of this paper is to provide an analysis of Cisco Systems primary business strategies and its utilization of information technologies to achieve a competitive advantage in the network equipment industry.

Cisco Systems Networking the Internet Revolution Brandi Martin [email protected] Table of Contents Paper Objective Section 1: The Network Equipment Industry A. Industry Profile B. Competitive Strategies within the Industry C. Porter Model Evaluation of Industry Forces D. Globalization of the Industry E. Importance of Information Technology to the Industry Section II: Company Perspective: An Analysis of Cisco Systems A. Cisco Company Profile B. Market and Financial Performance C. The Competitive Strategy D. Significance of Information Technologies E. Strengths and Weaknesses of Cisco Section III: A. Strategic Option Generator B. Roles, Roles and Relationships C. Redefine/Define D. Significance of Telecommunications E. Success Factor Profile Section IV: A Final Analysis of the Success of Cisco Systems A. Success of Business Strategy and Information Technology Use to Date B. The Effective Position of Cisco for the Future Objective of Paper The purpose of this paper is to provide an analysis of Cisco System's primary business strategies and its utilization of information technologies to achieve a competitive advantage in the network equipment industry. The paper is divided into four sections, starting with a broad industry analysis, then narrowing to concentrate on Cisco Systems Inc., followed by an analysis of their use of information technology. The

  • Word count: 15746
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Creating a database system for Mr Azizur Rahman, Mr Bilal Sheikh and Mr Iman Ahmed who are part of their own computer-upgrading business, called N.E.T

CONTENT TABLE ANALYSIS 3 .1 INTRODUCTION AND BACKGROUND INFORMATION 3 .2 THE CURRENT SYSTEM & PROBLEMS WITH THE SYSTEM 3 .3 QUESTIONNAIRE 10 .4 OBJECTIVES OF THE NEW SYSTEM 10 .5 DATAFLOW DIAGRAM OF CURRENT SYSTEM 11 .6 INPUT REQUIREMENTS 12 .7 STORAGE 12 .8 PROCESS REQUIREMENTS 12 .9 OUTPUT REQUIREMENTS 13 .10 DATA DYNAMICS 13 .11 SUB-TASKS 13 .12 PERFORMANCE INDICATOR 13 .13 HARDWARE & SOFTWARE REQUIREMENTS 14 .14 SYSTEM OVERVIEW 15 .15 USER'S SKILL LEVEL 15 .16 PLAN OF PROJECT COMPLETION 15 .17 CRITICAL PATH DIAGRAM 16 2 DESIGN 18 2.1 POSSIBLE SOLUTIONS 18 2.2 FINAL CHOICE OF SOFTWARE 18 2.3 DATA FLOW DIAGRAM OF PROPOSED SYSTEM 19 2.4 NORMALISATION 20 2.5 TABLE DESIGN 22 2.6 QUERY DESIGN 24 2.7 FORM DESIGN 26 2.8 REPORT DESIGN 27 2.9 MACRO DESIGN 27 2.10 SECURITY & BACK UP 27 2.11 GANTT CHART 28 2.12 TEST STRATEGY 28 2.13 TEST PLAN 29 3 IMPLEMENTATION 33 3.1 COMMENTARY ON IMPLEMENTATION AND IMPROVEMENTS 33 3.2 IMPLEMENTATION PLAN 34 4 TESTING 71 4.1 IMPROVED TEST PLAN 71 4.2 COMMENTARY ON TESTING 76 5 EVALUATION 90 5.1 LIMITATIONS 90 5.2 FUTURE ENHANCEMENTS 90 6 USER MANUAL 91 Analysis .1 Introduction and background information As part of my A2 ICT project I will be creating a database system for Mr Azizur Rahman, Mr Bilal Sheikh and Mr Iman Ahmed who are part of their own computer-upgrading business, called N.E.T (New

  • Word count: 14908
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

This research is about Management of network operating system at Natural Forest Resources management and Agroforestry Centre (NAFRAC) in Shinyanga, Tanzania as the case study.

RESEARCH REPORT ON: MANAGING NETWORK OPERATING SYSTEM IN THE ORGANIZATION A CASE OF NATURAL FOREST RESOURCES MANAGEMENT AND AGROFORESTRY CENTRE (NAFRAC), SHINYANGA. PREPARED BY: MARTIN, masanja (ADIT III 2007/2008) SUPERVISOR: KAVUTA, K. D A RESEARCH PROPOSAL SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARD OF ADVANCED DIPLOMA IN INFORMATION TECHNOLOGY OF THE INSTITUTE OF ACCOUNTANCY ARUSHA. ABSTRACT This research is about Management of network operating system at Natural Forest Resources management and Agroforestry Centre (NAFRAC) in Shinyanga, Tanzania as the case study. It has been conducted for 16 weeks at effective from the 1st October, 2007 to end of January, 2008. A case study method was used because the study was at a single unit and it is less expensive compared to other methods such as survey. The findings are presented in relation to the research questions, while analysis of data presented in relation to the proposed methods which are both qualitative and quantitative, with figures and tables by using scientific packages for social science (SPSS) & Microsoft excel (Version 2003). Data was interpreted in relation to the objectives of the study. The researcher gave a conclusion in relation to research questions and data interpretation against objectives of the study, and finally the researcher provided some recommendations for any

  • Word count: 11449
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

individual project

A study of a smart card ID system in government Submitted in partial fulfilment Of the requirements for the degree BSc (Hons) Business Information Systems Leeds Metropolitan University May 2004 Acknowledgements I would like to acknowledge the contribution others have made during my time at university and especially during the final year of my course towards the construction and completion of the individual project. First of all I would like to thank Ms Linda Strickler my supervisor for whom has stuck by me through some difficult times and has provided me with all the support and guidance that I have needed. Without her generous support and desire to succeed I would have been lost within the project. Secondly I would like to thank Mr Steve Cockerill for his astounding support and understanding throughout some very hard times that I faced. Without his strength and belief in me I would have been in a very difficult situation. And lastly I would like to thank my friends and family for their unwavering support throughout my years at university. Thank You All Plagiarism Disclaimer I certify that all material in this dissertation which is not my own has been identified and properly attributed. Signed: ------------------------------------------------- Date: --------------------------------------------------- Abstract The purpose of this report is to outline the

  • Word count: 11205
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Office systems project

Office Systems BSc Business Information Technology Year 3 An Inventory Control System for Titlas Ventures Limited Submitted by: Amalia Modu Eraul 2406026 Faderera Adeniyi 2500660 Oyindamola Sarumi 2501198 Submitted To: Mike Scott May 8, 2008 ACKNOWLEDGEMENTS We give utmost thanks God Almighty for seeing us through these years. We would like to thank our tutor Mr Mike Scott for his support with our group project. We will like to give special thanks to our family for their constant support and assistance. We also want to show appreciation to our colleagues who have contributed to our report in one way or another. TABLE OF CONTENTS CHAPTER PAGE TERMS OF REFERENCE 4 . INTRODUCTION 6 .1. COMPANY'S PROFILE 6 .2. COMPANY'S OPERATION 6 .3. PROBLEM DEFINITION 6 .4. PROJECT AIMS 7 2. OVERVIEW OF THE SYSTEM 8 2.1. CURRENT SYSTEM 8 2.1.1. PROBLEMS ASSOCIATED WITH CURRENT SYSTEM 8 2.2. REQUIREMENTS 9 2.3. PROPOSED SYSTEM 10 2.3.1. BENEFITS OF PROPOSED SYSTEM 10 2.4. BUSINESS SYSTEMS OPTIONS 16 2.4.1. OPTION 1 - LOCAL STANDALONE DATABASE 16 2.4.2. OPTION 3 - USING STOCK CONTROL SYSTEM SOFTWARE 17 2.5. RECOMMENDED BUSINESS SYSTEM OPTION 17 3. METHODOLOGY 18 3.1. RAPID APPLICATIONS DEVELOPMENT (RAD) 19 3.2. DYNAMIC SYSTEM DEVLOPMENT METHOD (DSDM) 20 3.3. CHOSEN METHODOLOGY 23 3.3.1. Moscow RULES 23 4. LITERATURE REVIEW 26

  • Word count: 8633
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Security in Wireless Local Area Networks

Security in Wireless Local Area Networks Sami Uskela Department of Electrical and Communications Engineering Helsinki University of Technology [email protected] Abstract When the wireless communications is coming to the offices and the homes, there are some new security issues to be taken care of. Today we have continuously growing markets for the wireless LANs, but there is big black hole in the security of this kind of networks. This paper gives an overview of the security functions specified in two wireless LAN standard, namely in the IEEE 802.11 and the HIPERLAN. There is also some discussion about the threats and vulnerabilities in wireless networks compared to wired networks. And last but not least the protocols and mechanisms needed in the secure wireless LAN are described. Table of Contents Introduction 2 Abbreviations and Definitions 3 Standards 3.1 HIPERLAN 3.2 IEEE 802.11 4 Threats and Vulnerabilities Compared to Wired LANs 4.1 Eavesdropping 4.2 Transitive Trust 4.3 Infrastructure 4.4 Denial of Service 5 Secure Solution 5.1 Design Goals 5.2 Design Overview 5.3 Authorization 5.4 Integrity and Confidentiality 5.5 Key Change Protocol 5.6 Key Management 5.7 Solution Analysis 6 Conclusions 7 References Introduction Around 1980 was the concept of the wireless LAN introduced and since 1985 have many companies tried to implement

  • Word count: 7709
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay