Evaluation of secure 802.1X port-based network access authentication over 802.11 wireless local area networks
Ozturk, Huseyin Selcuk
MetadataShow full item record
Since wireless technology has been used in Local Area Networks (LAN), our networks are easier to build and are more scalable and mobile than legacy structures. While providing these functionalities, Wireless LAN (WLAN)'s have some security vulnerabilities that should be addressed. Failing to examine the security risks of WLAN technology and take the necessary countermeasures may result in unauthorized entry into the legacy local area networks and other attacks. A secure connection to an intranet, which holds critical data and applications, must be the utmost consideration in the effort to protect critical resources. This thesis builds an open-source test-bed for evaluating WLAN security protocols. Moreover, it investigates the suitability of the IEEE 802.1X standard to provide the required security framework to WLANs. This research determines that the IEEE 802.1X could enhance the security level in authentication and privacy by the enabling rekeying process, but would not prevent Denial of Service attacks via unauthenticated management frames.
Approved for public release, distribution unlimited
Showing items related by title, author, creator and subject.
Brown, Thomas L. (Monterey, California. Naval Postgraduate School, 1993-09);In recent years, computer networks have significantly increased in both complexity and number, and these networks are attractive targets for attack and intrusion. Unix networks being managed by the government and providing ...
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2006-07);July 2006. The July 2006 issue of Homeland Security Affairs offers articles about risk perception, domestic right wing extremist groups, social network analysis, and the impact of foreign policy on homeland security. It ...
Mitigating risk to DOD information networks by improving network security in third-party information networks Kansteiner, Michael J. (Monterey, California: Naval Postgraduate School, 2016-06);Poorly defended third-party information networks can act as an attack vector for cyber attackers to successfully breach larger and more robustly defended information networks. Therefore, third-party networks connecting to ...