Universiti Teknologi Malaysia Institutional Repository

Secure wireless implementation based on IEEE 802.1X network standard

Alslakhi, Mahmoud H. R. (2007) Secure wireless implementation based on IEEE 802.1X network standard. Masters thesis, Universiti Teknologi Malaysia, Faculty of Computing.

[img]
Preview
PDF
1MB

Official URL: http://dms.library.utm.my:8080/vital/access/manage...

Abstract

Research in Information Technology has a tremendous growth in recent years mainly due to the affordability of the technology and consequently, a high increase in interest from users. In addition, the mobility systems which imply the use of wireless networks have increased rapidly. Currently, many organizations have provided extensive wireless services to their staffs. This poses a problem of securing the easy access to the wireless networks. Therefore, authentication has become an inevitable reality in the design of such systems. This research sought for the best authentication mechanism suitable for organizations in general, and to university campuses in particular. The result of this research is then the design and implementation of an authentication scheme based on IEEE 802.1x standard. The scheme provides secure access to users engaged in the wireless connection. It implements a two-factor authentication. The first factor is the username/password combination which the user provides prior logging onto the system. The second factor is the digital certificates that are stored locally in a client’s desktop/laptop. The mechanism involved in the authentication is based on EAP-TLS, which is a type of authentication method provided by IEEE 802.1x standard. The result of the implemented system is a highly secure scheme that provides both users and computers (machines) authentication. Only legitimate users with legitimate machines can access the wireless network system in an authorized way. In addition, the idea of a Users Tracking System Application (UTSA) has been introduced. This application basically tracks the users’ status and behavior (whether they are online or offline) as long as they are utilizing the network resources. It can later be utilized to track who, when and where the users are in the network systems.

Item Type:Thesis (Masters)
Additional Information:Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2007
Uncontrolled Keywords:extensive wireless services
Subjects:T Technology > TK Electrical engineering. Electronics Nuclear engineering
Divisions:Computing
ID Code:48099
Deposited By: Haliza Zainal
Deposited On:15 Oct 2015 01:09
Last Modified:12 Oct 2017 05:30

Repository Staff Only: item control page