Você está na página 1de 5

Bahria University, Islamabad

Research Proposal
Network Security FALL 2011

Date: 11-03-2011 MS-T&N-2B

Title:
Wireless Network Security
802.11,Bluetooth and Handheld
Devices

Group Members: Sami-Ullah(01-244102-


092)
Sagheer Abbas(01-
244102-091)

Instructor: Mr Mudassar Hussain


Bahria University, Islamabad
Research Proposal
Network Security FALL 2011

Date: 11-03-2011 MS-T&N-2B

Instructor: Mr Mudassar Hussain


Research Proposal
(Channel Coding & de-coding by using convolution coding with
viterbi de-coding scheme)

Research Methodology FALL 2010

Date: 24-11-10 MS-T&N-1B

1- Title: Wireless Network Security 802.11,Bluetooth and


Handheld Devices

2- INTRODUCTION:

Wireless technologies have become increasingly popular in our everyday business and
personal lives. Personal digital assistants (PDA) allow individuals to access calendars, e-mail,
address and phone number lists, and the Internet. Some technologies even offer global
positioning system (GPS) capabilities that can pinpoint the location of the device anywhere in
the world. Wireless technologies promise to offer even more features and functions in the
next few years.

An increasing number of government agencies, businesses, and home users are using, or
considering using, wireless technologies in their environments. Agencies should be aware
of the security risks associated with wireless technologies. Agencies need to develop strategies
that will mitigate risks as they integrate wireless technologies into their computing
environments. This document discusses certain wireless technologies, outlines the associated
risks, and offers guidance for mitigating those risks.

3-General Aim(s) of the Investigation:


The purpose of this project is to provide agencies with guidance for establishing secure
wireless networks. Agencies are encouraged to tailor the recommended guidelines and
1

solutions to meet their specific security or business requirements.

The document addresses two wireless technologies that government agencies are most likely to
employ: wireless local area networks (WLAN) and ad hoc or—more specifically—Bluetooth
networks. The document also addresses the use of wireless handheld devices. The document
does not address technologies such as wireless radio and other WLAN standards that are not
designed to the Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard.
These technologies are out of the scope of this document.

Instructor: Mr Mudassar Hussain


Research Proposal
(Channel Coding & de-coding by using convolution coding with
viterbi de-coding scheme)

Research Methodology FALL 2010

Date: 24-11-10 MS-T&N-1B

4-SPECIFIC OBJECTIVES OF THE RESEARCH

Wireless technologies are changing rapidly. New products and features


are being introduced continuously. Many of these products now offer
security features designed to resolve long-standing weaknesses or address
newly discovered ones. Yet with each new capability, a new threat or
vulnerability is likely to arise. Wireless technologies are evolving swiftly.
Therefore, it is essential to remain abreast of the current and emerging trends in
the technologies and in the security or insecurities of these technologies. Again, this guideline
does not cover security of other types of wireless or emerging wireless technologies such as third-
generation (3G) wireless telephony.

5-Importance of the Research:


Wireless communications offer organizations and users many benefits such as portability and
flexibility, increased productivity, and lower installation costs. Wireless technologies cover
a broad range of differing capabilities oriented toward different uses and needs. Wireless
local area network (WLAN) devices, for instance, allow users to move their laptops from place
to place within their offices without the need for wires and without losing network connectivity.
Less wiring means greater flexibility, increased efficiency, and reduced wiring costs. Ad hoc
networks, such as those enabled by Bluetooth, allow data synchronization with network
systems and application sharing between devices. Bluetooth functionality also eliminates
cables for printer and other peripheral device connections. Handheld devices such as
personal digital assistants (PDA) and cell phones allow remote users to synchronize personal
databases and provide access to network services such as wireless e-mail, Web browsing, and
Internet access. Moreover, these technologies can offer dramatic cost savings and new
capabilities to diverse applications ranging from retail settings to manufacturing shop floors to
first responders.
However, risks are inherent in any wireless technology. Some of these risks are similar to those
of wired networks; some are exacerbated by wireless connectivity; some are new. Perhaps
the most significant source of risks in wireless networks is that the technology’s underlying
communications medium, the airwave, is open to intruders, making it the logical equivalent

Instructor: Mr Mudassar Hussain


Research Proposal
(Channel Coding & de-coding by using convolution coding with
viterbi de-coding scheme)

Research Methodology FALL 2010

Date: 24-11-10 MS-T&N-1B


of an Ethernet port in the parking lot.
The loss of confidentiality and integrity and the threat of denial of service (DoS) attacks
are risks typically associated with wireless communications. Unauthorized users may gain
access to agency systems and information, corrupt the agency’s data, consume network
bandwidth, degrade network performance, launch attacks that prevent authorized users from
accessing the network, or use agency resources to launch attacks on other networks.

Instructor: Mr Mudassar Hussain

Você também pode gostar