Українська   Русский
DonNTU   Masters' portal

Abstract

Содержание

Introduction

Digital technologies are developing very actively today, and the pace of their development no longer surprises anyone. Already, everyone is trying to make predictions of what this will all lead to. The beginning of this high-speed race was served by many factors, one of which is the emergence and development of the Internet. Wireless networks offer new opportunities. They greatly bypassed their competitors by the speed and efficiency of network equipment, mobility and cost. Wireless technologies are used everywhere and can meet a fairly wide range of needs.

1. Theme urgency

To date, there is a stable development and widespread use of wireless networks. No one person, let alone a large corporation, can function fully without using information technologies, in particular wireless networks. From this it follows that the study of vulnerabilities in these networks is an urgent task.

Wireless networks offer several advantages. The main one is mobility, which in turn allows Access the network at any time in the radius of action. This increases the speed of circulation and finding the necessary information. In the information age, the speed of access and processing of information largely determines the success of the company.

2. Goal and tasks of the research

Objective: To investigate the vulnerabilities of the wireless network standard IEEE 802.11n – Wi-Fi. Search for methods to improve the system.

Main tasks of the research:

  1. Research and analysis of existing protocols of the IEEE 802.11 standard.
  2. An analysis of the vulnerabilities of the system when transmitting information over a wireless communication channel.
  3. Analysis and evaluation of existing methods that will improve the characteristics of the system.
  4. Search for solutions to minimize the impact of wireless network vulnerabilities.
  5. Development of a research model in the LabView software.
  6. Research methods reduce the impact of vulnerabilities on the basis of the developed model.

Research object: wireless networks standard IEEE 802.11n – Wi-Fi, their vulnerabilities, the process of transferring information in these networks, as well as network equipment.

Research subject: the group of IEEE 802.11 standards, methods for improving system performance, and methods for reducing the impact of vulnerabilities.

Conclusion

Wireless networks continue to actively develop and improve. Today, many security measures have been developed and improved their performance, but there are vulnerabilities that need to be considered. The study of this issue will further improve the characteristics of wireless networks.

This master's work is not completed yet. Final completion: May 2018. The full text of the work and materials on the topic can be obtained from the author or his head after this date.

References

  1. IEEE Standard association, ANSI/IEEE 802.11n-2009 – IEEE Standard for Information technology – Local and metropolitan area networks – Specific requirements – Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 5: Enhancements for Higher Throughput [Электронный ресурс]. – Режим доступа: http://standards.ieee.org/findstds/standard/802.11n-2009.html.
  2. Беделл П. Сети. Беспроводные технологии. – М.: НТ Пресс, 2008. – 448 с.
  3. Пролетарский А.В., Баскаков И.В., Чирков Д.Н. Беспроводные сети Wi-Fi. М.: БИНОМ, 2007. – 178 c.
  4. Столлингс В. Беспроводные линии связи и сети: Пер. с англ. – М.: Издательский дом «Вильямс», 2003. – 640 с.
  5. Junaid T. M., Mufti M., Ilyas M. U. Vulnerabilities of IEEE 802.11i Wireless LAN CCMP Protocol [Электронный ресурс]. – Режим доступа: http://www.waset.org/publications/7162/vulnerabilities-of-ieee-802.11i-wireless-lan-ccmp-protocol
  6. Хансен Д. Атаки на беспроводные сети Электронный ресурс. / Д. Хансен [Электронный ресурс]. – Режим доступа: http://www.securitylab.ru/analytics/216360.php
  7. Щетитнина Л.А. Уязвимости сетевых коммуникаций в современном обществе: теоретико-методологический поход [Электронный ресурс]. – Режим доступа: http://www.twirpx.com/file/2002788/
  8. Куценко И. О., Жайворонок Д. А. Анализ уязвимостей беспроводных сетей // Вестник ВИ МВД России. №4 2007. – 140-143 с.
  9. Edney W. Real 802.11 Security: Wi-Fi Protected Access and 802.11i / W. Edney, A. Arbaugh – Addison-Wesley Longman Publishing Co., 2003. – 186 р.
  10. Райан Р. Защита от хакеров беспроводных сетей.: «ДМК Пресс», 2005. – 480 с.
  11. Мерритт М. Безопасность беспроводных сетей / М. Мерритт, Д. М. Поллино: «ДМК Пресс», 2004. – 288 с.
  12. Зегжда Д.П. Основы безопасности информационных систем / Д.П. Зегжда, A.M. Ивашко. М.: Горячая линия – Телеком, 2000. – 452 с.
  13. Губсков Ю.А. Анализ методов защиты WI-FI сетей и их уязвимостей / Ю.А. Губсков, В.А. Манюхин, М.Д. Киселёв, А.В. Болдырев, Д.Ю. Верещагин [Электронный ресурс]. – Режим доступа: https://elibrary.ru/item.asp?id=29315850
  14. Гепко И.А. Бондаренко А.В Современные беспроводные сети. Состояние и перспективы развития / И.А. Гепко, В.Ф. Олейник, Ю.Д. Чайка,. Киев: ЕКМО, 2009. – 672 с.
  15. Васин В.А. Информационные технологии в радиотехнических системах.: Уч. пособие / В.А. Васин, И.Б. Власов, Ю.М. Егоров и др.; под ред. И.Б. Федорова. М.: Изд-во МГТУ им. Н.Э. Баумана, 2003. – 672 с.
  16. Vishnevsky V. M., Lyakhov A. I. IEEE 802.11 Wireless LAN: Saturation Throughput Analysis with Seizing Effect Consideration // Cluster Computing. – 2002. 133-144 рр.
  17. Баранов А. В., Ляхов А. И. Оценка производительности беспроводных локальных сетей с протоколом IEEE 802.11 при произвольной нагрузке // Автоматика и Телемеханика. – № 7. – 2005. 87-101 с.
  18. Вишневский В.М., Ляхов А.И., Портной С.Л., Шахнович И.В. Широкополосные беспроводные сети передачи информации. Москва: Техносфера, 2005. – 592 с.