Wexler, J. (2004). 802.11i security standard goes on the books. Retrieved June12, 2007 Wi-Fi Alliance. (2004). Wi-Fi Protected Access: Strong, standards-based, interoperable security for today’s Wi-Fi networks. Retrieved June10, 2007, from http://www.wi-fi.org/files/wp_8_WPA%20Security_4-29-03.pdf Williams, J. (2001, Nov-Dec). The IEEE 802.11b security problem, part 1. IT Pro, 91- 96. Wong, J. (2003). Performance investigation <strong>of</strong> secure 802.11 wireless LANs: Raising the security bar to which level? Unpublished Dissertation, University <strong>of</strong> Canterbury. Wong, S. (2003). The evolution <strong>of</strong> wireless security in 802.11 networks: WEP, WPA and 802.11 standards. Retrieved June 12, 2007, from http://www.sans.org/reading_room/whitepapers/wireless/1109.php Woodward, A. (2005). Recommendations for wireless network security policy: an analysis and classification <strong>of</strong> current and emerging threats and solutions for different organisations. Paper presented at the 3rd Australian Information Security Management Conference, Perth, Western Australia. Xia, H., & Brustoloni, J. C. (2005). Hardening Web browsers against man-in-themiddle and eavesdropping attacks. Paper presented at the 14th international conference on World Wide Web, Chiba, Japan. Ye, Q., & MacGregor, M. H. (2006). Combining Petri Nets and ns-2: A hybrid method for analysis and simulation. Paper presented at the Proceedings <strong>of</strong> the 4th annual communication Networks and services research conference. Yek, S., & Bolan, C. (2004). An analysis <strong>of</strong> security in 802.11b and 802.11g wireless networks in Perth, W.A. Paper presented at the 5th Annual Information Warfare and Security Conference, Perth, Western Australia. Zahur, Y. (2004). Wireless Local Area Network - Security and Performance. Unpublished Thesis, University <strong>of</strong> Houston - Clear Lake, Houston. 52
Appendices Appendix 1: Example <strong>of</strong> Data and Results 54 Appendix 2: Network Simulation S<strong>of</strong>tware 68 53
- Page 1 and 2:
Exploring Wireless Network Security
- Page 3 and 4:
Attestation of Authorship “I here
- Page 5 and 6:
Table of Contents ABSTRACT II ATTES
- Page 7 and 8:
5.4 SUMMARY 41 CHAPTER 6 CONCLUSION
- Page 9 and 10:
List of Tables Table 2.1 Overview o
- Page 11 and 12:
SNMP Simple Network Management Prot
- Page 13 and 14: Chapter 1 Introduction Wireless net
- Page 15 and 16: Chapter 2 Literature Review 2.1 Int
- Page 17 and 18: 2005). The first advantage of this
- Page 19 and 20: 2.3.1 802.11a The 802.11a was relea
- Page 21 and 22: multiple output” or simply referr
- Page 23 and 24: node is expected to decrypt the cha
- Page 25 and 26: Borisov, Golberg and Wagner (2001)
- Page 27 and 28: Passive attacks are mostly undetect
- Page 29 and 30: describe that most access points (A
- Page 31 and 32: protocol, and the SSID. Lin et al.
- Page 33 and 34: Chapter 3 Research Methodology 3.1
- Page 35 and 36: Figure 3.1 The location and path of
- Page 37 and 38: listen for any responding probe res
- Page 39 and 40: Chapter 4 Results and Analysis 4.1
- Page 41 and 42: Manufacturer Detected % D-Link Corp
- Page 43 and 44: 4.2.3.2 ESS (AP) In the day scan, 7
- Page 45 and 46: 4.2.5.2 Encryption WLAN in Auckland
- Page 47 and 48: The research also discovered that t
- Page 49 and 50: Network administrator should ensure
- Page 51 and 52: includes but not limited to the fol
- Page 53 and 54: integrity and availability are the
- Page 55 and 56: Chapter 6 Conclusions 6.1 Introduct
- Page 57 and 58: 6.6 Concluding remarks The WLANs is
- Page 59 and 60: Carli, M., Rosetti, A., & Neri, A.
- Page 61 and 62: Jardosh, A., Belding-Royer, E. M.,
- Page 63: Shimonski, R. J. (2003). Wireless A
- Page 67 and 68: Figure A 1 WLANs (Day Scan) Figure
- Page 69 and 70: Figure A 5 WLAN (Day Scan) that are
- Page 71 and 72: Figure A 9 Wireless (Night Scan) wi
- Page 73 and 74: Table A 1 Device Manufacturer (Day
- Page 75 and 76: Table A 3 MAC addresses detected in
- Page 77 and 78: Table A 4 MAC addresses detected in
- Page 79 and 80: Table A 5 MAC addresses detected in
- Page 81 and 82: Computer network simulators are ess
- Page 83: Simulator Web Address Type Scale Ne