Security Enhancement for Wireless Communication

lowlyoutstandingMobile - Wireless

Nov 24, 2013 (3 years and 11 months ago)

77 views

Formal Report


Bassam
A. Al
-
Mogahed

T
-
TH 10:30
-
11:45


May 10, 2007


Security Enhancement for Wireless Communication

By Bassam A. Al
-
Mogahed


Abstract


As the use of telecommunication increases, so do the problems surrounding
network security and data confidentiality. Companies with copious amounts of
sensitive information

on file are especially vulnerable in the telecommunication
process, due to their high responsibility to maintain client confidentiality. As
frequency and intricacy of telecommunication rises, possible risks must be
examined, and security precautions taken
. This paper cites a particular company,
Genentech, a healthcare organization
that

regularly uses wireless
communication to transfer vital customer information. In addition, it involves a
second company, Safeco, the engineers from which worked to enhance s
ecurity
for Genentech. At the project’s commencement, Genentech security was far from
insufficient; however, it lacked a concise overarching pro
cedure for all security
features used
. Through testing mutual authentication, integrity and confidentiality,
the

Safeco engineers determined the most secure and efficient methods, and
proposed a plan to enhance overall wireless communication protection. In order
to examine the Genentech system, Safeco constructed a hypothetical scenario
using three terminals, each i
n a separate building. In this way, they recreated
wireless communication and simulated interruptions of this correspondence from
an invented unauthorized user. Thus, the engineers found varying possible
approaches to security enhancement, and evaluated ea
ch based on standards of
reliability, efficiency, complexity and security. In order to reap optimal results,
Safeco proposed a combined model of security methods that would yield the
most favorable elements of each component. This paper is divided into
sec
tions
that outline the materials

and methods utilized, budget and timeline information,
conclusions, results
,

and the

supporting graphs and tables. (253
words)











Formal Report


Bassam
A. Al
-
Mogahed

T
-
TH 10:30
-
11:45


May 10, 2007

Table of Contents












Executive Summary........................................
..............................................

Introduction...................................................................................................

Materials and Methods............................................................................
.....


Physical Setup
..................................................................................


Experiments
......................................................................................


Testing
Standards
..
...........................................................................
........................

Results..........................................................................................................

Conclusion................................
....................................................................

Recommendations........................................................................................

Appendices.........................................................................
..........................

Appendix A: Annotated Bibliography.................................................

Appendix B:
Glossary
...........................................................
.............

Appendix C:
Project Schedule
.....................
...
....................
...............

Appendix D:
Technical Specification............
................................
.....

Ap
pendix E:
Formal Report

Outline
....
........................
.......................

Appendix F: Research
..............................
.................................
........


Appendix G: Turnitin.com Color Report.............................................


1

2

2

2

3

4

4

5

5



i

iv

vii

viii

xx

xxi

xxxi
v




Formal Report


Bassam
A. Al
-
Mogahed

T
-
TH 10:30
-
11:45


May 10, 2007

List of Tables and Figures













Tables


Table 1: Test Compone
nts and C
lassifications
.......................
..........
....
.......

3

Table 2. Authentication Protocols Experiment Results
.................................

4

Table 3. Integrity Experiment Results
...........................................................

4

Table 4. Confidentiality Experiment Results
.................................................

5

Table 5. Equipment
.......................................................................................

viii

Table 6
.
Test Components and C
lassifications
...
.........................................

xix

Figures

Figure

1. Basic Physical Settings
..................................................................

2

Figure

2. Experiment Process
...................................................................
...

3

F
igure 3. W
ireless N
etw
ork S
etup
.....
.............
...............
...............................

ix

Figure 4. Router Placement
.........................................................................

ix

Figure 5. Internet

Connection
...............
........................................................

ix

Figure 6. Wireless Checking
........................................................................

x

Figure 7. Device

Configuration

......
.......................................................
.....

x

Figure 8. Physical Wireless Settings
.........................................................

xi

Figure 9.
Basic Layout of the Experiment

Process
....................................

xi

Figure 10.
Input Authentication Protocols and Correspondin
g Strategies
...

xiii

Figure 11.

Input Integrity Protocols and Corresponding Strategies
............

xiv

Figure 12.

Input Confidentiality Protocols and Corresponding Strategies
...

xv

Figure 13. Authentication Experiment Process
............................
................

xvi
i

Figure 14. Integrity Experiment Process
......................................................

xvii
i

Figure 15. Confidentiality Experiment Process
............................................

xix