Font Size: a A A

Implementation Of WLAN With Strong Authentication

Posted on:2019-05-08Degree:MasterType:Thesis
Country:ChinaCandidate:HAWA HOCH DIRRANEHFull Text:PDF
GTID:2428330578972717Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In recent years,wireless communication applications have become a major part in our life.Almost every day we check our emails or on personal computer via wireless Local Area Network(WLAN)connections.Like most advances,wireless LAN poses both opportunities and risks.The evolution of wireless networking in recent years has raised many serious security issues.Failing to examine the security risks of WLAN technology and to take the necessary countermeasures may result in unauthorized entry into the legacy local area networks and other attacks.Thus,there is a great interest for me to find and implement the solutions specific to WLAN.These security threats include rogue proxies,message alteration,password theft,connection hijacking,etc.In addition,the current model of NPS has a limitation for global access that makes users maintain multiple identities and credentials.In this thesis,we propose authentication NPS to secure our network and we also implement a literature review on authentication,authorization and accounting in wireless local area networks(WLANs).We present different authentication methods for accessing network in wired and wireless environments.Finally,we design and implement some experiments with IEEE 802.lx is an IEEE standard used to provide an effective or efficiency security to the devices over LAN/WLAN.The framework IEEE 802.1x is chosen a NPS for authentication and authorization with a RADIUS server.In the practical part of the study,I implement three different forms authentication to centralize a network wireless,and then choose the one who corresponds to our needs.We were working on two software(VMware and GNS3)that help us set up our secure network a simulation way and to assure the authentication and the authorization of the users,ant the practice explains by steps the implementation in to the private network of the RADIUS protocol that was chosen as an AAA protocol.DHCP,DNS,SQL servers' and active directory's basic ideas were discussed and put into practice.As the result the private network was created,where RADIUS server authenticates wirelessly connected users.The accounting has helped to gather the outcome of how RADIUS behaves and which decisions were made for the specific user.
Keywords/Search Tags:Wireless Security, 802.1X, Radius, NPS, Attacks
PDF Full Text Request
Related items