wi-fi security: protecting insecure channels
TRANSCRIPT
-
8/2/2019 Wi-Fi Security: Protecting Insecure Channels
1/6
Wi-Fi Security: Protecting Insecure Channels
Outline:
1. Title page - Name, Capstone Project title, date, advisor and courseinstructor.
2. Abstract - Concise description of principle accomplishments or results.3. Copyright page4. Introduction - Includes background (text the reader needs to know to
understand the research work), context (what has been done or iscurrently being done by others, and how the student contribution fittogether with and contribute to previous efforts?), and motivation (why isthis research study important?).
5. Methodology Description of the technical details of the student worksthat has been reviewed by experts in the field.
6. Results and Discussion Explanation of the data and observations gatheredin the research and their interpretation. This also includes the discussionof the data, the significance and relation to a broader context. Results anddiscussion sections can be put together or placed in separate paragraphsas per the student choice.
7. Conclusions Includes summary of the main conclusions of the researchwork and possibly suggest future research directions.
8. References Includes bibliographic references to existing literaturedescribed in the introduction. The format of the reference section shouldbe that directed by the advisor.
9. Acknowledgements To contributors and others.
The below are the references for Wi-Fi Security: Protecting Insecure Channels
project. The below references will help you to get start working on writing the project
of 30 pages.
1) Background
http://www.sysdesign.ca/archive/networksecurity2009.pdf
http://www.wlug.org/files/wifi-security.pdf
2) Methodology
Page 1 of 6
-
8/2/2019 Wi-Fi Security: Protecting Insecure Channels
2/6
Wi-Fi Security: Protecting Insecure Channels
http://books.google.ae/books?
id=eZ4cCsfaXyUC&pg=PA48&dq=advantages+and+disadvantages+Prima
ry+Research+method&hl=en&sa=X&ei=qw2AT_ipDuOQ0AWWzsnpBg&re
dir_esc=y#v=onepage&q=advantages%20and%20disadvantages
%20Primary%20Research%20method&f=false
http://books.google.ae/books?
id=wY2bSaEm8l8C&pg=PA127&dq=advantages+and+disadvantages+Pri
mary+Research+method&hl=en&sa=X&ei=qw2AT_ipDuOQ0AWWzsnpBg
&redir_esc=y#v=onepage&q=advantages%20and%20disadvantages
%20Primary%20Research%20method&f=false
3) Findings
http://mysbfiles.stonybrook.edu/~mlayer/cse102/HW3.html
http://www.openitmag.com/2011/07/wi-fi-security/
http://www.guardmyip.com/wifi-hotspot-security.html
http://www.complexnetworks.fr/security-modes-of-wi-fi-access-points-in-
paris/
http://fanaticmedia.com/infosecurity/archive/Feb10/5-Wireless-Security-
Threats_v2.htm
http://infosecawareness.in/downloads/handbooks/wifi-security-ebook.pdf
Page 2 of 6
-
8/2/2019 Wi-Fi Security: Protecting Insecure Channels
3/6
Wi-Fi Security: Protecting Insecure Channels
http://java.uom.gr/~chalkias/e107_files/public/wifi-
security_FINAL_chalkias.pdf
http://books.google.ae/books?
id=rLRgMdjwzxsC&pg=PA57&dq=Wifi+Security:
+Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_
5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting
%20insecure%20Channels&f=false
http://www.hsc.fr/ressources/articles/hakin9_wifi/hakin9_wifi_EN.pdf
http://books.google.ae/books?
id=QuISwdREL1sC&pg=PT425&dq=Wifi+Security:
+Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_
5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting
%20insecure%20Channels&f=false
http://www.airtightnetworks.com/fileadmin/pdf/resources/WiFi_Security_Be
st_Practices.pdf
http://books.google.ae/books?id=-
T7RRtAxRJ8C&pg=PA326&dq=Wifi+Security:
+Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_
5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting
%20insecure%20Channels&f=false
http://www.staysmartonline.gov.au/__data/assets/pdf_file/0004/19525/F17
_wi-fi_security.pdf
Page 3 of 6
-
8/2/2019 Wi-Fi Security: Protecting Insecure Channels
4/6
Wi-Fi Security: Protecting Insecure Channels
http://books.google.ae/books?
id=UDE_T26hBm4C&pg=PA413&dq=Wifi+Security:
+Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_
5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting
%20insecure%20Channels&f=false
http://cdn.ttgtmedia.com/rms/pdf/Manager%E2%80%99s%20Guide%20to
%20Wi-Fi%20security%20policies.pdf
http://books.google.ae/books?
id=EATgHiGtCc4C&pg=PA26&dq=Wifi+Security:
+Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_
5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting
%20insecure%20Channels&f=false
http://books.google.ae/books?
id=mzkEAAAAMBAJ&pg=PA10&dq=Wifi+Security:
+Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_
5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting
%20insecure%20Channels&f=false
http://books.google.ae/books?
id=0RfANAwOUdIC&pg=PA92&dq=Wifi+Security:
+Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_
5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting
%20insecure%20Channels&f=false
http://books.google.ae/books?
id=UE2wEc9NfB8C&pg=PA409&dq=Wifi+Security:
Page 4 of 6
-
8/2/2019 Wi-Fi Security: Protecting Insecure Channels
5/6
Wi-Fi Security: Protecting Insecure Channels
+Protecting+insecure+Channels&hl=en&sa=X&ei=yAqAT_voD-
Gj0QXmytmFBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A
%20Protecting%20insecure%20Channels&f=false
http://books.google.ae/books?
id=f24wFELSzkoC&pg=PA5&dq=Wifi+Security:
+Protecting+insecure+Channels&hl=en&sa=X&ei=yAqAT_voD-
Gj0QXmytmFBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A
%20Protecting%20insecure%20Channels&f=false
http://books.google.ae/books?
id=UE2wEc9NfB8C&pg=PA409&dq=Wifi+Security:
+Protecting+insecure+Channels&hl=en&sa=X&ei=yAqAT_voD-
Gj0QXmytmFBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A
%20Protecting%20insecure%20Channels&f=false
http://books.google.ae/books?
id=VYlm5qzXUscC&pg=PA318&dq=Wifi+Security:
+Protecting+insecure+Channels&hl=en&sa=X&ei=FAuAT__jI-
mg0QWj6ZWOBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A
%20Protecting%20insecure%20Channels&f=false
http://books.google.ae/books?id=XI52je-
zaW8C&printsec=frontcover&dq=Wifi+Security:
+Protecting+insecure+Channels&hl=en&sa=X&ei=XguAT9_KDaSv0QWMi
Nj8Bg&redir_esc=y#v=onepage&q&f=false
http://bcm-india.org/wifiBooklet.pdf
Page 5 of 6
-
8/2/2019 Wi-Fi Security: Protecting Insecure Channels
6/6
Wi-Fi Security: Protecting Insecure Channels
http://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-
de_bouvette-farina.pdf
http://csrc.nist.gov/archive/wireless/S02-Opening%20remarks-tg.pdf
Page 6 of 6