Blar i NTNU Open på forfatter "Eian, Martin"
-
Cryptanalysis of IEEE 802.11i TKIP
Halvorsen, Finn Michael; Haugen, Olav (Master thesis, 2009)The Temporal Key Integrity Protocol (TKIP) was created to fix the weaknesses of Wired Equivalent Privacy (WEP). Up until November 2008, TKIP was believed to be a secure alternative to WEP, although some weak points were ... -
Cryptanalysis of IEEE 802.11i TKIP
Halvorsen, Finn Michael; Haugen, Olav (Master thesis, 2009)The Temporal Key Integrity Protocol (TKIP) was created to fix the weaknesses of Wired Equivalent Privacy (WEP). Up until November 2008, TKIP was believed to be a secure alternative to WEP, although some weak points were ... -
Cryptanalysis of IEEE 802.11i TKIP.
Lodhi, Ammar (Master thesis, 2010)This thesis is based upon the work of Beck and Tews [ 24 ]. It presents and experimentally Validate the Beck and Tews attack on a network with QoS client Associated with a Non- QoS AP.This is done by Slightly extending the ... -
Detecting Intermediary Hosts by TCP Latency Measurements
Singh, Gurvinder; Eian, Martin; Willassen, Svein Yngvar; Mjølsnes, Stig Frode (Journal article; Peer reviewed, 2011) -
Detecting MAC Spoofing Attacks in 802.11 Networks through Fingerprinting on the MAC Layer
Idland, Christer (Master thesis, 2011)In order to provide hassle-free connection options many wireless local area network (WLAN) providers choose to have their networks completely open. In other words there is no password required in order to connect. Such ... -
Detecting Wireless Identity Spoofs in Urban Settings, Based on Received Signal Strength Measurements
Pedersen, Øystein Aas (Master thesis, 2010)The most common gateway for executing attacks in 802.11 networks are the MACspoofing attack. Current Todays Wireless IDS implements different methods todetect MAC spoofing, but are particularly interested in using methods ... -
Robustness in Wireless Network Access Protocols
Eian, Martin (Doctoral Theses at NTNU, 1503-8181; 2012:230, Doctoral thesis, 2012)Wireless network access protocols are used in numerous safety critical applications. Network availability is essential for safety critical applications,since loss of availability can cause personal or material damage. An ... -
Session hijacking in WLAN based public networks
Bækkelund, Ørjan (Master thesis, 2009)The background for this masters thesis is the threat of session hijacking in public wireless networks. A public wireless network in this context is a network such as Wireless Trondheim where users with WLAN enabled devices ...