Improving the security of EAP-EHash authentication method

Size: px
Start display at page:

Download "Improving the security of EAP-EHash authentication method"

Transcription

1 Imoving th scity of EAP-EHash athntication mthod AIT HEMAD Milod 1 EL KIRAM Molay Ahmd 2 LAZREK Azzddin 3 Univsity Cadi Ayyad, Faclty of cincs EMLALIA - Datmnt of Comt cincs Bd. Pinc My Abdllah, B.P. 2390, Maakch, Moocco 1 m.aithmad@cam.ac.ma, 2 Kiam@cam.ac.ma, 3 lazk@cam.ac.ma Abstact., val EAP athntication mthods hav cntly bn oosd to ns athntication in wilss ntwoks. Most of ths mthods qi high comtation cost fo th os of scity. Howv, thy a not sitabl fo s in a soc constaind ntwok nvionmnt. EAP-EHash is on of th vy fw intsting mthods, which w dsignd fo s in sch nvionmnt. EAP-EHash qis low comtation cost and combins simlicity and scity. In this a, w show that EAP-EHash sffs fom sios scity dfcts. Thn, w oos imovmnts to coct ths flaws. Résmé. Récmmnt, lsis méthods d'athntification EAP (Extnsibl Athntication Potocol) ont été oosés o ass l'athntification dans ls ésax sans fil Pami cs intéssants oositions, fig EAP-EHash, qi a été conç o alli la simlicité t la sécité. Dans c ai, nos montons q EAP-EHash soff d défats imotants. Ensit, nos allons oos ds amélioations afin d combl cs lacns. Kywods: city, Athntication, Wilss ntwok, 802.1X, EAP. Mots clés : 802.1x, écité, Résa sans fil, 802.1X, WLAN, EAP. *Amélioation d la sécité d la méthod d athntification EAP-EHash Rv RIT, vol. 18, n 2,

2 1. Intodction inc thi aaanc, th wilss local aa ntwoks (WLANs) (Gast, 2005) hav bn gadd as a siml xtnsion of wid LANs. Howv, th incasing nd to commnicat fly and wilssly mad ths ntwoks boom, and thy gadally incasd thi comtitivnss comad to wid ntwoks. Howv, thy a vy vlnabl to malicios avsdoing and thfo vy snsitiv to scity isss. Indd, to tansmit infomation ov adio wavs facilitats thi intction by intds. To fac th low lvl of wilss LANs scity and to mak it simila to that of wid LANs, th IEEE woking go has dfind th WEP (Wid Eqivalnt Pivacy) mchanism (Blbl, Batmaz, Ozl, 2008). Unfotnatly, WEP sffs fom a nmb of waknsss (Mill, Hamilton, 2002; Blbl, Batmaz, Ozl, 2008). Th nw standads; scially 802.1X (IEEa, 2004a) and i (IEEa, 2004b) w t fowad to coct ths dfcts. Th 802.1X standad (ynd, 2002; IEE, 2004a) ovids athntication, accss contol and ky managmnt. Not that 802.1X is also sd in th i standad fo athntication. Th incil of 802.1X is as follows: if a clint, who is also known as slicant, wants to connct to th ntwok, th accss oint, that also calld athnticato, blocks all taffic xct th on latd to th athntication ocss ntil h is athnticatd to th athntication sv. Oftn, th athntication sv is RADIU sv (Rmot Athntication Dial-In Us vic) (Aboba, Calhon, 2003) X is basd on EAP (Extnsibl Athntication Potocol) (Aboba and al. 2004; Aboba, imon, Eonn, 2004), dfind by th IETF (Intnt Engining Task Foc) to ns athntication. This otocol scifis a gnic famwok fo mltil athntication mthods. Ths mthods dfin athntication schms and ky distibtion. Th athntication mthod sd is tansant to th accss oint; only th clint and athntication sv s it. Th accss oint simly lays EAP mssags btwn th clint and athntication sv, xct th last on which snts th slt of athntication (sccss o fail). Following this slt, th accss oint allows o blocks th clint to accss to th ntwok. Th EAP mssags xchangd btwn th mobil station and accss oint a caid in EAPOL (EAP ov LAN) fams. And th ons xchangd btwn th accss oint and athntication sv a caid in EAPOR (EAP ov RADIU) fams. EAP sots sval athntication mthods (Dant, Clothi, Ati, 2007), inclding: EAP-MD5 (Aboba and al. 2004), EAP-TL (Aboba, imon, 1999), EAP- 2010, vol.18, n 2 Rv RIT 115

3 TTL (Fnk, Blak-Wilson, 2004), EAP-LEAP and EAP-PEAP (Palka and al. 2003) X dos not imos any scific athntication mthod. This has tiggd many sachs and woks to dvlo a obst, sc and fast on. Among th intsting cnt mthods oosd is EAP-EHash (Chikhoho, Bn Jmaa, Lant-Maknavicis, 2006; Chikhoho and al. 2009), which combins sd, fficincy and mtal athntication. Th st of this a is oganizd as follows. A viw of EAP-Hash athntication mthod is dscibd in ction 2. In ction 3, w show th scity flaws of EAP-EHash w fond and w snt o oosd imovmnts. In ction 4, w shall analyz th oosd imovmnt schm. Finally, ction 5 snts th conclsion. 2. Rviw of EAP-EHash athntication mthod Th EAP-EHash mthod (Chikhoho and al. 2009) has bn oosd to b sd in a soc constaind ntwok nvionmnt. That's why EAP- EHash dcs th cytogahic load qid fo mtal athntication, by sing th symmtic cytogahy, challng-sons athntication mchanism and on-way hash fnction. In EAP-EHash, only on sct ky PK (P-had Ky) nd to b shad btwn th clint and athntication sv. This ky is sd to div two diffnt kys AK and EK. Th clint and th athntication sv mst hav ths two kys to ov thi idntitis. o, this mitigats dictionay and foc attacks, and thn nhancs scity. Indd, to imsonat a lgitimat ntity, th intd mst hav two kys and not jst on. EAP-EHash consists of th hass (Fig 1): ngotiation has, athntication has and ky divation has. 116 Rv RIT 2010, vol.18, n 2

4 Clint Accss Point Athntication v EAP Idntity Rqst l i c a n t EAP Idntity Rsons EAP Rqst (challng mssag, dfalt fnctions) EAP Rsons (sotd fnctions) EAP Rqst (challng mssag) EAP Rqst (sons to challng) EAP ccss mssag EAPOL-Ky mssag v Ngotiation has Athntication has Ky divation has Fig 1: EAP-EHash hass 2.1. Ngotiation has Th ngotiation has allows th clint and th athntication sv to ngotiat th cihsit which will b sd ding athntication has. Th cihsit consists of th hash fnction and th ncytion algoithm. As shown in Fig 1, aft th qst of th athnticato, th clint shows his idntity in an EAP mssag to accss oint which lays it to th athntication sv. Ding all xchangs EAP, th ol of accss oint is limitd to lay EAP mssags btwn th clint and athntication sv. Th Ngotiation has stats with th athntication sv snding its configd dfalt cihsit to clint. Ths data consist a fild, calld "Algo". Aft, th clint chcks th "Algo" fild. In cas of sccss, th clint sonds with EAP-Rsons mssag and th ngotiation has is don. Othwis, anoth cas is dscibd into dtails in (Chikhoho and al. 2009) Athntication has Th athntication has (Fig 2) bgins with th athntication sv snding to clint a mssag that contains two andom nmbs Challng and Rand, sv's idntity vid, cihsit (Algo) and th slt of ncytion of MIC sing ky EK and th symmtic algoithm. Th MIC (Mssag Intgity Chck) is a hash val calclatd as follows: MIC1 = F (AK, Challng vid Rand Algo) sch: 2010, vol.18, n 2 Rv RIT 117

5 F dnots a on-way hash fnction (chni, 1996) (sch as HMAC-HA-1 o HMAC-MD5). AK (Athntication Ky) and EK (Encytion Ky) a two sssion kys divd fom PK as AK = F(PK, Rand) and EK = F(PK, Rand vid ClintID) wh dnots th concatnation and ClintID dnots th clint's idntity. Thn, th clint calclats th sam kys as th sv. Thn, h comts th MIC and comas it with th on civd. If thy match, th athntication sv is athnticatd to th clint. Thn, th clint snds th sv a andom nmb RandC combind with th cihsit (Algo) and th slt of ncytion of Hash sing ky EK and th symmtic algoithm. Th Hash is a hash val calclatd as follows: Hash = F(AK, Challng RandC Algo). In tn, th sv calclats th Hash and comas it with th on civd. In cas of sccss, th clint is athnticatd to th athntication sv. EAP ov LAN Accss Point EAP ov RADIU Athntication v l i c a n t Challng, vid, Rand, Algo, {MIC} EK RandC, Algo, {Hash} EK EAP ccss mssag v Fig 2: EAP-EHash athntication has 2.3. Ky divation has Th ky divation has (Chikhoho, 2009) allows th clint and th accss oint to ag on a sssion ky PTK. Th goal is to sc th taffic xchangd ov adio link. 118 Rv RIT 2010, vol.18, n 2

6 3. Vlnabilitis and oosd imovmnt of EAP-EHash Th athntication has of EAP-EHash snts two majo scity flaws: Vlnability to lay attack. Vlnability to known ky attack Vlnability to lay attack EAP-EHash is an EAP mthod that is basd on challng-sons athntication mchanism. In sch a mchanism, th vifi ntity snds a andom nmb, it is th challng. Using a shad sct, th ntity, who claims athntication, mst sond accoding to th challng. This mchanism is sd mainly to ns th fshnss of xchangd mssags and ths to cont th lay attack which consists of laying som old mssags intctd ding an ali commnication. EAP-EHash is vlnabl to lay attack. Indd, th clint athnticats th sv bfo it snds a challng. o, th challng-sons mchanism is not oly imlmntd in th clint sid. This mits any intd, who lads this ty of attack, to imsonat a lgitimat sv to th clint. To cay ot this attack, what th intd has to do is only intct th fist mssag ding an ali commnication btwn th clint and th athntication sv. Onc h has this mssag, th intd can asily imsonat th sv by snding this mssag to th clint. In EAP-EHash, bfo athnticating th sv, th clint mst vify th MIC, which contains th challng of sv bt not his. To athnticat th clint, th sv mst chck th Hash which contains th clint's challng. To cont lay attack, w oos vsing th ocss, that is to say, th MIC will b sd to athnticat th clint and th Hash to athnticat th athntication sv. O oosd imovmnt of EAP-EHash athntication has is shown in Fig , vol.18, n 2 Rv RIT 119

7 EAP ov LAN Accss Point EAP ov RADIU Athntication v l i c a n t Challng, vid, Rand RandC, Algo, {MIC} EK Algo, {Hash} EK No data EAP ccss mssag v Fig 3: O oosd imovmnt of EAP-EHash athntication has 3.2. Vlnability to known ky attack As sssion kys a stod in mmoy ding th sssion, thy a lativly asi to b comomisd than th P-shad kys. Th known ky attack consists of sing an old comomisd sssion ky fo imsonation in a nw sssion. Using only th challng gnatd by th athntication sv whn calclating two kys AK and EK, maks th EAP-EHash vlnabl to known ky attack. Indd, if an intd can sccssflly comomis th kys AK and EK in a givn sssion, h may s ths two kys as oftn as h wishs, in od to imsonat a lgitimat athntication sv to th clint, ovidd that h ss th sam challng Rand slctd ding th comomisd sssion. To coct this dfct, w oos to s also th clint's challng RandC whn calclating kys AK and EK. Ths, ths kys will b comtd as follows: AK = F(PK, Rand RandC) and EK = F(PK, Rand RandC vid ClintID). In ths two attacks, th intd dos not obtain ky PTK sd fo ncytion of mssags xchangd btwn th clint and accss oint. o, th goal of ths attacks is not to allow th intd to dcyt th xchangd mssags, bt to mislad th clint by making him think h is connctd to a lgitimat sv and so to a lgitimat ntwok whil it is not th cas. 120 Rv RIT 2010, vol.18, n 2

8 4. Th scity analysis of th oosd imovmnt W hav shown in th vios sction that EAP-EHash has two sios waknsss abot th athntication of athntication sv. Ths flaws a d ssntially to inaoiat s of th challng-sons mchanism. At fist, w admit that th challng-sons mchanism mits to ns th fshnss of xchangd mssags. Th coct s of clint's challng fo athntication of sv maks it infasibl fo an intd to lad th lay attack against EAP-EHash fo imsonating as valid athntication sv. am, th s of clint's challng whn comting sssion kys avoids known ky attack against EAP-EHash. O oosd imovmnts basd on th s of clint's challng whil th athntication of sv and th calclation of sssion kys. As a slt, o oosd imovmnts can ctainly ai th scity flaws of EAP-EHash. 5. Conclsion Th EAP-EHash is an intsting oosal, as it gatly dcs th cytogahic load qid by most EAP athntication mthods and it ovids mtal athntication. Dsit its mits, EAP-EHash, as oosd by its athos, has two sios scity waknsss abot th athntication of athntication sv. Th athos of EAP-EHash claim that thi mthod sists attacks. W hav shown that EAP-EHash is vlnabl to known ky attack. W hav also shown that any intd, who avsdos on th ntwok, can lay mssags intctd ding a io commnication and thfo imsonat a lgitimat sv. Fthmo, w hav oosd th imovmnts to cont sch attacks. Ths oosd imovmnts mak EAP-EHash mo sc and obst. 6. Réféncs Aboba, B. t al Extnsibl Athntication Potocol (EAP). «IETF RFC 3748», Jn 2004 Aboba, B., Calhon, P RADIU (Rmot Athntication Dial In Us vic) ot Fo Extnsibl Athntication Potocol (EAP). «IETF RFC 3579». tmb 2003 Aboba, B., imon, D PPP EAP TL Athntication Potocol. «RFC 2716» Aboba, B., imon, D., Eonn, P Extnsibl Athntication Potocol (EAP) Ky Managmnt Famwok. «IETF RFC 5247», Agst 2008 Blbl, H., Batmaz, I., Ozl, M Wilss ntwok scity: comaison of WEP (Wid Eqivalnt Pivacy) mchanism, WPA (Wi-Fi Potctd Accss) and RN (Robst city Ntwok) scity otocols. Pocdings of th 1st intnational 2010, vol.18, n 2 Rv RIT 121

9 confnc on «Fonsic alications and tchniqs in tlcommnications, infomation, and mltimdia and woksho, Aticl 9», Janay 2008 Chikhoho, O. t al An EAP-EHash Athntication Mthod Adatd to Rsoc Constaind Tminals. Annals ds Télécommnications. (Engining Collction) Chikhoho, O., Bn Jmaa, M., Lant-Maknavicis M Novll méthod d'athntification EAP-EHash. «12èm Colloq Fancohon s l'ingénii ds Potocols - CFIP» Convy,., Mill, D., ndaalingam, Cisco AFE: Wilss LAN scity in dth. Cisco ystms Dant, R., Clothi, G., Ati, A EAP mthods fo wilss ntwoks. Comt tandads & Intfacs. Mach, 29(3) Fnk, P., Blak-Wilson, EAP Tnnld TL Athntication Potocol (EAP- TTL). «daft-itf-xt-a-ttls-05.txt, intnt daft», Jly 2004 Gast, M wilss ntwok. O'Rilly IEEE X IEEE tandad fo Local and Mtoolitan Aa Ntwoks Pot-Basd Ntwok Accss Contol. «IEEE, Piscataway» IEEE i standad LAN/MAN cific Rqimnts, Pat 11: Wilss LAN Mdim Accss Contol (MAC) and Physical Lay (PHY) scifications: cification fo Enhancd city Mill, B.R., Hamilton, B.A Isss in Wilss city WEP, WPA& i. Pocdings of th «18th Annal Comt city Alications Confnc», Dcmb 2002 Palka, A. t al Potctd EAP Potocol (PEAP) vsion 2. «daft-josfssonxt-a-tls-a-07.txt, intnt daft», Octob 2003 chni, B Alid Cytogahy. cond dition, John Wily & ons. nyd, J What is 802.1X?. Ntwok Wold Global Tst Allianc. [n lign]. May Disonibl à l adss : Rv RIT 2010, vol.18, n 2

Tank Level GPRS/GSM Wireless Monitoring System Solutions

Tank Level GPRS/GSM Wireless Monitoring System Solutions Tank Lvl GPRS/GSM Wilss Monitoing Systm Solutions HOLYKELL TECHNOLOGY CO.LTD May,2014 Ⅰ. Solution Rquimnts 1. Intoduction Th solution is mainly including: wilss data tansciv tminal, lvl snso and PC sv

More information

Load Balancing Algorithm Based on QoS Awareness Applied in Wireless Networks

Load Balancing Algorithm Based on QoS Awareness Applied in Wireless Networks , pp.191-195 http://x.oi.og/10.14257/astl.2015.111.37 Loa Balancing Algoithm Bas on QoS Awanss Appli in Wilss Ntwoks CHEN Xiangqian, MA Shaohui Dpatmnt of Comput Scinc an Tchnology, Hnan Mchanic an Elctical

More information

Incorporating Statistical Process Control and Statistical Quality Control Techniques into a Quality Assurance Program

Incorporating Statistical Process Control and Statistical Quality Control Techniques into a Quality Assurance Program Incooating Statistical Pocss Contol and Statistical Quality Contol Tchniqus into a Quality Assuanc Pogam Robyn Sikis U.S. Cnsus Buau Puos Incooat SPC and SQC mthods into quality assuanc ogam Monito and

More information

Sale Mode Choice of Product Extended Warranty based on the Service Level

Sale Mode Choice of Product Extended Warranty based on the Service Level Intnational Jonal of - and - Svic, Scinc and Tchnology Vol8, No 8 (015, pp1-1 http://dxdoiog/101457/ijnsst0158801 Sal od Choic of Podct Extndd Waanty basd on th Svic Lvl Li Ji School of Infoation Tchnology,

More information

Factors that Influence Memory

Factors that Influence Memory Ovlaning Factos that Influnc Mmoy Continu to study somthing aft you can call it pfctly. Psychology 390 Psychology of Laning Stvn E. Mi, Ph.D. Listn to th audio lctu whil viwing ths slids 1 2 Oganization

More information

An AnyLogic Simulation Model for Power and Performance Analysis of Data Centres

An AnyLogic Simulation Model for Power and Performance Analysis of Data Centres An AnyLogic Simulation Modl fo Pow and Pfomanc Analysis of Data Cnts Bjön F. Postma and Boudwijn R. Havkot Cnt fo Tlmatics and Infomation Tchnology, Univsity of Twnt, th Nthlands {b.f.postma, b..h.m.havkot}@utwnt.nl

More information

HEAT TRANSFER ANALYSIS OF LNG TRANSFER LINE

HEAT TRANSFER ANALYSIS OF LNG TRANSFER LINE Scintific Jounal of Impact Facto(SJIF): 3.34 Intnational Jounal of Advanc Engining and sach Dvlopmnt Volum,Issu, Fbuay -05 HEAT TANSFE ANALYSIS OF LNG TANSFE LINE J.D. Jani -ISSN(O): 348-4470 p-issn(p):

More information

The (Bad?) Timing of Mutual Fund Investors. Oded Braverman,* Shmuel Kandel,** and Avi Wohl*** First version: February 2005 This version: August 2005

The (Bad?) Timing of Mutual Fund Investors. Oded Braverman,* Shmuel Kandel,** and Avi Wohl*** First version: February 2005 This version: August 2005 Th (Bad? Timing of Mutual Fund Invstos by Odd Bavman,* Shmul Kandl,** and Avi Wohl*** Fist vsion: Fbuay 2005 This vsion: August 2005 W thank Invstmnt Comany Institut (ICI fo oviding us th mutual fund data

More information

Events and Constraints: A Graphical Editor for Capturing Logic Requirements of Programs

Events and Constraints: A Graphical Editor for Capturing Logic Requirements of Programs Evnts and Constaints: A Gaphical Edito fo Captuing Logic Rquimnts of Pogams Magat H. Smith Bll Laboatois Rm. 2C-407 600 Mountain Avnu Muay Hill, NJ 07974 mhs@sach.bll-labs.com Gad J. Holzmann Bll Laboatois

More information

Before attempting to connect or operate this product, please read these instructions carefully and save this manual for future use.

Before attempting to connect or operate this product, please read these instructions carefully and save this manual for future use. Modl No. RAID Boad Instuctions WJ-NDB301 Bfo attmpting to connct o opat this poduct, plas ad ths instuctions cafully and sav this manual fo futu us. Waning: All ok latd to th installation of this poduct

More information

A Newer Secure Communication, File Encryption and User Identification based Cloud Security Architecture

A Newer Secure Communication, File Encryption and User Identification based Cloud Security Architecture A Nw cu Counication, Fil Encyption and Idntification basd Cloud cui Achitctu Tonny hkha Ka 1, M. A. Pavz Mahud 2,hahjadi Hisan Fajana 3,Kaws Wazd Nafi 1, and Bikash Chanda Kaoka 1 Dpatnt Coput cinc and

More information

IT Update - August 2006

IT Update - August 2006 IT Nws Saus: No Aciv Til: Da: 7726 Summay (Opional): Body: Wlcom Back! Offic of Infomaion Tchnology Upda: IT Upda - Augus 26 Rob K. Blchman, Ph.D. Associa Dico, Offic of Infomaion Tchnology Whil You W

More information

Moving Securely Around Space: The Case of ESA

Moving Securely Around Space: The Case of ESA Moving Scurly Around Spac: Th Cas of ESA Prpard By: Andra Baldi, Jos Frnandz Balsiro, Marco Incollingo Tommaso Parrinllo, Cristiano Silvagni, Stfano Zatti Europan Spac Agncy Andra.Baldi@sa.int ESA Scnario

More information

ETSI TS 102 901 V1.1.1 (2011-06) Technical Specification

ETSI TS 102 901 V1.1.1 (2011-06) Technical Specification T T 102 901 V1.1.1 (2011-06) Tchnical pcification Ntwok Tting (NT); NN ntopability Tt pcification; NN intopability tt dciption fo R 2 T T 102 901 V1.1.1 (2011-06) Rfnc DT/NT-00033 Kywod, intopbility, intwoking,

More information

Continuity Cloud Virtual Firewall Guide

Continuity Cloud Virtual Firewall Guide Cloud Virtual Firwall Guid uh6 Vrsion 1.0 Octobr 2015 Foldr BDR Guid for Vam Pag 1 of 36 Cloud Virtual Firwall Guid CONTENTS INTRODUCTION... 3 ACCESSING THE VIRTUAL FIREWALL... 4 HYPER-V/VIRTUALBOX CONTINUITY

More information

Design of Extended Warranties in Supply Chains. Abstract

Design of Extended Warranties in Supply Chains. Abstract Dsign of Extndd Waantis in Supply Chains Kunpng Li Univsity of Illinois at Ubana Champaign, Collg of Businss Dilip Chhajd Univsity of Illinois at Ubana Champaign, Collg of Businss Suman Mallik Univsity

More information

The example is taken from Sect. 1.2 of Vol. 1 of the CPN book.

The example is taken from Sect. 1.2 of Vol. 1 of the CPN book. Rsourc Allocation Abstract This is a small toy xampl which is wll-suitd as a first introduction to Cnts. Th CN modl is dscribd in grat dtail, xplaining th basic concpts of C-nts. Hnc, it can b rad by popl

More information

Reach Versus Competition in Channels with Internet and Traditional Retailers

Reach Versus Competition in Channels with Internet and Traditional Retailers Rach Vsus Comptition in Channls with Intnt and Taditional Rtails Bai R Nault Haskayn School of Businss, Univsity of Calgay, Calgay, Albta, Canada, nault@ucalgayca Mohammad S Rahman Haskayn School of Businss,

More information

Using Open Source Tools to Support Collaboration Within CALIBRE.

Using Open Source Tools to Support Collaboration Within CALIBRE. Using On Suc Tls t Sut Cllabatin Within CALIBRE. Paul Adams, David Nutt, Sthn Rank, and Cnlia Bldyff Univsity f Lincln Lincln, UK {adams,dnutt,sank,cbldyff}@hmswll.lincln.ac.uk Abstact This a dscibs th

More information

Chad Saunders 1, Richard E Scott 2

Chad Saunders 1, Richard E Scott 2 Chad Sauds 1, Richad E Sco 2 1 Haskay School of Busiss. 2 Dpam of Commuiy Halh Scics ad Family Mdici / Dico, Offic of Global -Halh Sagy. Uivsiy of Calgay, Calgay, Alba, Caada Md--Tl 2013 Luxmboug, G. D.

More information

A Systematic Approach to the Comparison of Roles in the Software Development Processes

A Systematic Approach to the Comparison of Roles in the Software Development Processes A Systmatic Appoach to th Compaison of Rols in th Softwa Dvlopmnt Pocsss uat Yilmaz 1, Roy V. O Conno 2 and Paul Clak 1 1 Lo Gaduat School in Softwa Engining, Dublin City Univsity, Iland 2 Lo, th Iish

More information

Bridge Functions Consortium

Bridge Functions Consortium Port-Based Network Access Control Technical Document Revision 2.0 University of New Hampshire 121 Technology Drive, Suite 2 Durham, NH 03824-4716 Phone: +1-603-862-3525 http://www.iol.unh.edu Fax: +1-603-862-4181

More information

Defending DoD Missions in the Commercial Cloud

Defending DoD Missions in the Commercial Cloud Dfndng DoD Mssons n th Commcal Cloud Pt Dnsmo Cybscuty Rsk Managmnt 18 Jun 2015 UNCLASSIFIED 1 Data Catgozaton IMPAC LEVELS Lvl 1: Unclassfd Infomaton Appovd fo Publc Rlas Lvl 2: Non-Contolld Unclassfd

More information

Problem Solving Session 1: Electric Dipoles and Torque

Problem Solving Session 1: Electric Dipoles and Torque MASSACHUSETTS INSTITUTE OF TECHNOLOGY Dpatmnt of Physics 8.02 Poblm Solving Sssion 1: Elctic Dipols and Toqu Sction Tabl (if applicabl) Goup Mmbs Intoduction: In th fist poblm you will lan to apply Coulomb

More information

A Threat Analysis of The Extensible Authentication Protocol

A Threat Analysis of The Extensible Authentication Protocol A Threat Analysis of The Extensible Authentication Protocol Lei Han Student #: 100304821 April, 2006 Supervised by Professor Michel Barbeau School of Computer Science Carleton University Honors Project

More information

WIRELESS NETWORK SECURITY

WIRELESS NETWORK SECURITY WIRELESS NETWORK SECURITY Much attention has been focused recently on the security aspects of existing Wi-Fi (IEEE 802.11) wireless LAN systems. The rapid growth and deployment of these systems into a

More information

A Model for Antenna-Plasma Wave Coupling towards Control of Uniformity in Slot-Excited Microwave Discharges

A Model for Antenna-Plasma Wave Coupling towards Control of Uniformity in Slot-Excited Microwave Discharges J. Plasa Fusion Rs. SERIES, Vol. 9 () A Modl fo Antnna-Plasa Wav Couling towads Contol of Unifoity in Slot-Excitd Micowav Dischags Daichi SAWADA, Akihio TSUJI, Takanoi KITSUDO, Yasuyoshi YASAKA, and Hioasa

More information

QUANTITATIVE METHODS CLASSES WEEK SEVEN

QUANTITATIVE METHODS CLASSES WEEK SEVEN QUANTITATIVE METHODS CLASSES WEEK SEVEN Th rgrssion modls studid in prvious classs assum that th rspons variabl is quantitativ. Oftn, howvr, w wish to study social procsss that lad to two diffrnt outcoms.

More information

Aegis Identity Software, Inc. Experts in Identity Management 100% Focused on Education

Aegis Identity Software, Inc. Experts in Identity Management 100% Focused on Education Impact of Idntity and Acc Managmnt with Fdation on P-20 Individualizd Laning and Cloud Rouc Agi Idntity Softwa, Inc. Expt in Idntity Managmnt 100% Focud on Education Popty of Agi Idntity Softwa, Inc. Dcmb

More information

New Basis Functions. Section 8. Complex Fourier Series

New Basis Functions. Section 8. Complex Fourier Series Nw Basis Functions Sction 8 Complx Fourir Sris Th complx Fourir sris is prsntd first with priod 2, thn with gnral priod. Th connction with th ral-valud Fourir sris is xplaind and formula ar givn for convrting

More information

UNIK4250 Security in Distributed Systems University of Oslo Spring 2012. Part 7 Wireless Network Security

UNIK4250 Security in Distributed Systems University of Oslo Spring 2012. Part 7 Wireless Network Security UNIK4250 Security in Distributed Systems University of Oslo Spring 2012 Part 7 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s charter to develop

More information

Handout 3. Free Electron Gas in 2D and 1D

Handout 3. Free Electron Gas in 2D and 1D Handout 3 F lcton Gas in D and D In this lctu ou will lan: F lcton gas in two dinsions and in on dinsion Dnsit o Stats in -spac and in ng in low dinsions C 47 Sping 9 Fahan Rana Conll Univsit lcton Gass

More information

Important Information Call Through... 8 Internet Telephony... 6 two PBX systems... 10 Internet Calls... 3 Internet Telephony... 2

Important Information Call Through... 8 Internet Telephony... 6 two PBX systems... 10 Internet Calls... 3 Internet Telephony... 2 Installation and Opration Intrnt Tlphony Adaptr Aurswald Box Indx C I R 884264 03 02/05 Call Duration, maximum...10 Call Through...7 Call Transportation...7 Calls Call Through...7 Intrnt Tlphony...3 two

More information

FEE-HELP INFORMATION SHEET FOR DOMESTIC FULL FEE STUDENTS

FEE-HELP INFORMATION SHEET FOR DOMESTIC FULL FEE STUDENTS FEE-HELP INFORMATION SHEET FOR DOMESTIC FULL FEE STUDENTS This is n infomtion sht poducd by th Monsh Lw Studnts Socity Juis Docto Potfolio to ssist full f pying studnts (domstic) in undstnding th issus

More information

Gravity and the Earth Newtonian Gravity and Earth Rotation Effects

Gravity and the Earth Newtonian Gravity and Earth Rotation Effects Gavity and th Eath Nwtonian Gavity and Eath Rotation Effcts Jams R. Clynch, 003 I. Nwtonian Gavity A. Nwtonian Gavitational Foc B. Nwtonian Gavitational Fild C. Nwtonian Gavitational Potntial D. Gavity

More information

Lecture 3. WPA and 802.11i

Lecture 3. WPA and 802.11i Lecture 3 WPA and 802.11i Lecture 3 WPA and 802.11i 1. Basic principles of 802.11i and WPA 2. IEEE 802.1X 3. Extensible Authentication Protocol 4. RADIUS 5. Efficient Handover Authentication 1 Lecture

More information

Parallel and Distributed Programming. Performance Metrics

Parallel and Distributed Programming. Performance Metrics Paralll and Distributd Programming Prformanc! wo main goals to b achivd with th dsign of aralll alications ar:! Prformanc: th caacity to rduc th tim to solv th roblm whn th comuting rsourcs incras;! Scalability:

More information

A Note on Approximating. the Normal Distribution Function

A Note on Approximating. the Normal Distribution Function Applid Mathmatical Scincs, Vol, 00, no 9, 45-49 A Not on Approimating th Normal Distribution Function K M Aludaat and M T Alodat Dpartmnt of Statistics Yarmouk Univrsity, Jordan Aludaatkm@hotmailcom and

More information

Physics. Lesson Plan #9 Energy, Work and Simple Machines David V. Fansler Beddingfield High School

Physics. Lesson Plan #9 Energy, Work and Simple Machines David V. Fansler Beddingfield High School Physics Lsson Plan #9 Engy, Wok an Simpl Machins Davi V. Fansl Bingfil High School Engy an Wok Objctivs: Dscib th lationship btwn wok an ngy; Display an ability to calculat wok on by a foc; Intify th foc

More information

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points. http://www.veryxtech.com

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points. http://www.veryxtech.com White paper Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points http://www.veryxtech.com White Paper Abstract Background The vulnerabilities spotted in the Wired Equivalent Privacy (WEP) algorithm

More information

Design for Cyclic Loading

Design for Cyclic Loading Dsign o Cyclic Loading 1. Compltly vsing cyclic stss and ndanc stngth A ply vsing o cyclic stss mans whn th stss altnats btwn qal positiv and ngativ pak stsss sinsoidally ding ach 300 cycl o opation, as

More information

Cloud and Big Data Summer School, Stockholm, Aug., 2015 Jeffrey D. Ullman

Cloud and Big Data Summer School, Stockholm, Aug., 2015 Jeffrey D. Ullman Cloud and Big Data Summr Scool, Stockolm, Aug., 2015 Jffry D. Ullman Givn a st of points, wit a notion of distanc btwn points, group t points into som numbr of clustrs, so tat mmbrs of a clustr ar clos

More information

Panel Discussion: Evolving DoD Security Requirements for Cloud

Panel Discussion: Evolving DoD Security Requirements for Cloud Unclassfd Panl Dscusson: Evolvng DoD Scuty Rqumnts fo Cloud Rog S. Gnwll Chf, Cybscuty 29 Januay 2015 Balancng Scuty and Rsk Unclassfd Govnmnt Pvat Cloud (DoD ntgatd and opatd commcal tchnology) On-pms

More information

ME 612 Metal Forming and Theory of Plasticity. 6. Strain

ME 612 Metal Forming and Theory of Plasticity. 6. Strain Mtal Forming and Thory of Plasticity -mail: azsnalp@gyt.du.tr Makin Mühndisliği Bölümü Gbz Yüksk Tknoloji Enstitüsü 6.1. Uniaxial Strain Figur 6.1 Dfinition of th uniaxial strain (a) Tnsil and (b) Comprssiv.

More information

Certficate Extensions and Attributes Supporting Authentication in PPP and Wireless LAN. Daniel Schwarz

Certficate Extensions and Attributes Supporting Authentication in PPP and Wireless LAN. Daniel Schwarz Certficate Extensions and Attributes Supporting Authentication in PPP and Wireless LAN Daniel Schwarz Overview: 1. Introduction I. PKIX 2. Basics I. PPP II. EAP III. 802.1x IV. X.509 certificate extensions

More information

CS 356 Lecture 29 Wireless Security. Spring 2013

CS 356 Lecture 29 Wireless Security. Spring 2013 CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter

More information

The 802.1x specification

The 802.1x specification The 802.1x specification Fulvio Risso Politecnico di Torino Based on an existing presentation of Piero Nicoletti 1 IEEE 802.1x Port-Based Network Access Control Use physical access characteristics of IEEE

More information

Network Access Security It's Broke, Now What? June 15, 2010

Network Access Security It's Broke, Now What? June 15, 2010 Network Access Security It's Broke, Now What? June 15, 2010 Jeffrey L Carrell Network Security Consultant Network Conversions SHARKFEST 10 Stanford University June 14-17, 2010 Network Access Security It's

More information

UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU

UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU ITMS: 26140230008 DOPYTOVO ORIENTOVANÝ PROJEKT Moderné

More information

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo (

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo ( Hubs, Bidges, and Switches Used fo extending LANs in tems of geogaphical coveage, numbe of nodes, administation capabilities, etc. Diffe in egads to: m collision domain isolation m laye at which they opeate

More information

Swisscom Cloud Strategy & Services

Swisscom Cloud Strategy & Services Swisscom Stratgy & Srvics Swisscom our 360 On for Entrpris Workloads and Wb Srvics Dynamic Computing Srvics Our intgratd approach is uniqu B2C B2B Ntwork, infrastructur and IT from a singl sourc All Industris

More information

The Casino Experience

The Casino Experience Th Casino Expin with Mahi s authnti Indian uisin Lt us nttain you Th Casino Expin 10 Th Staight Flush Expin 20 p ps If you looking fo a gat night out, a Casino Expin patnd This is a gat intoduti to gaing

More information

Architecture of the proposed standard

Architecture of the proposed standard Architctur of th proposd standard Introduction Th goal of th nw standardisation projct is th dvlopmnt of a standard dscribing building srvics (.g.hvac) product catalogus basd on th xprincs mad with th

More information

EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE 802.11i (WPA2)

EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE 802.11i (WPA2) EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE 802.11i (WPA2) Moffat Mathews, Ray Hunt Department of Computer Science and Software Engineering, University of Canterbury, New Zealand {ray.hunt@canterbury.ac.nz}

More information

10 Evaluating the Help Desk

10 Evaluating the Help Desk 10 Evalating the Help Desk The tre measre of any society is not what it knows bt what it does with what it knows. Warren Bennis Key Findings Help desk metrics having to do with demand and with problem

More information

EAP Methods for 802.11 Wireless LAN Security

EAP Methods for 802.11 Wireless LAN Security EAP Methods for 802.11 Wireless LAN Security Overview Because they broadcast data on the open airways, wireless networks present unique challenges for authentication mechanisms not encountered on wired

More information

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2 Wi-Fi Security FEUP>MIEIC>Mobile Communications Jaime Dias Symmetric cryptography Ex: RC4, AES 2 Digest (hash) Cryptography Input: variable length message Output: a fixed-length bit

More information

A Secure Web Services for Location Based Services in Wireless Networks*

A Secure Web Services for Location Based Services in Wireless Networks* A Scur Wb Srvics for Location Basd Srvics in Wirlss Ntworks* Minsoo L 1, Jintak Kim 1, Shyun Park 1, Jail L 2 and Sokla L 21 1 School of Elctrical and Elctronics Enginring, Chung-Ang Univrsity, 221, HukSuk-Dong,

More information

WiFi Security: WEP, WPA, and WPA2

WiFi Security: WEP, WPA, and WPA2 WiFi Security: WEP, WPA, and WPA2 - security requirements in wireless networks - WiFi primer - WEP and its flaws - 802.11i - WPA and WPA2 (RSN) Why security is more of a concern in wireless? no inherent

More information

Authenticated Encryption. Jeremy, Paul, Ken, and Mike

Authenticated Encryption. Jeremy, Paul, Ken, and Mike uthntcatd Encrypton Jrmy Paul Kn and M Objctvs Examn thr mthods of authntcatd ncrypton and dtrmn th bst soluton consdrng prformanc and scurty Basc Componnts Mssag uthntcaton Cod + Symmtrc Encrypton Both

More information

C H A P T E R 1 Writing Reports with SAS

C H A P T E R 1 Writing Reports with SAS C H A P T E R 1 Writing Rports with SAS Prsnting information in a way that s undrstood by th audinc is fundamntally important to anyon s job. Onc you collct your data and undrstand its structur, you nd

More information

IT-Sicherheit: Sicherheitsprotokolle. Wireless Security. (unter Benutzung von Material von Brian Lee und Takehiro Takahashi)

IT-Sicherheit: Sicherheitsprotokolle. Wireless Security. (unter Benutzung von Material von Brian Lee und Takehiro Takahashi) IT-Sicherheit: Sicherheitsprotokolle Wireless Security (unter Benutzung von Material von Brian Lee und Takehiro Takahashi) ! 61 ints 5 2 Po ss e c Ac 3 Built in Security Features!!!!!! Service Set Identifier

More information

Certified Wireless Security Professional (CWSP) Course Overview

Certified Wireless Security Professional (CWSP) Course Overview Certified Wireless Security Professional (CWSP) Course Overview This course will teach students about Legacy Security, encryption ciphers and methods, 802.11 authentication methods, dynamic encryption

More information

Chapter 7 Yielding criteria

Chapter 7 Yielding criteria Chat 7 Yiling itia. Citia fo yiling What is th maning about yil ition? In this as th stss is un-axial an this oint an aily b tmin. But what if th a sval stss ating at a oint in iffnt ition? Th itia fo

More information

Extensible Authentication Protocol (EAP) Security Issues

Extensible Authentication Protocol (EAP) Security Issues Sotillo ECU 1 Extensible Authentication Protocol (EAP) Security Issues Samuel Sotillo, Dept. of Technology Systems, East Carolina University Abstract This document describes the Extensible Authentication

More information

Effect of Contention Window on the Performance of IEEE 802.11 WLANs

Effect of Contention Window on the Performance of IEEE 802.11 WLANs Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,

More information

A Project Management framework for Software Implementation Planning and Management

A Project Management framework for Software Implementation Planning and Management PPM02 A Projct Managmnt framwork for Softwar Implmntation Planning and Managmnt Kith Lancastr Lancastr Stratgis Kith.Lancastr@LancastrStratgis.com Th goal of introducing nw tchnologis into your company

More information

THE FUNDAMENTALS OF CURRENT SENSE TRANSFORMER DESIGN. Patrick A. Cattermole, Senior Applications Engineer MMG 10 Vansco Road, Toronto Ontario Canada

THE FUNDAMENTALS OF CURRENT SENSE TRANSFORMER DESIGN. Patrick A. Cattermole, Senior Applications Engineer MMG 10 Vansco Road, Toronto Ontario Canada , Snior Alications nginr MMG 10 Vansco Road, Toronto Ontario Canada Abstract Th following ar will first rviw th basic rincils of oration of a Currnt Sns Transformr and thn follow a simlifid dsign rocdur.

More information

Preflighting for Newspaper

Preflighting for Newspaper Pflighing f Nwspp PS PDF EPS TIFF JPG Cifid Ghn pflighing* Lyd PDF pfligh ps Fixs ppss isss: ich blck x, hilins, vpins, c. Cn psv nspncis Cs nlizd p Pxy Csizbl pfligh nd p-fix pins Cn wch UNC nd FTP flds

More information

Integration of Unemployment Insurance with Pension Through Individual Savings Account

Integration of Unemployment Insurance with Pension Through Individual Savings Account Intgation of nmloymnt Inanc ith Pnion Thogh Inivial Saving Accont Joh Stiglitz Datmnt of Economic Stanfo nivity Phon: -854-67 Fax: -579-997 Email: tglitz@tanfo. Jngyoll Yn Datmnt of Economic Eha nivity

More information

How To Write A Storybook

How To Write A Storybook ISTANBUL UNIVERSITY JOURNAL OF ELECTRICAL & ELECTRONICS ENGINEERING YEAR VOLUME NUMBER : 004 : 4 : (6-70) REALIZATION OF REACTIVE CONTROL FOR MULTI PURPOSE MOBILE AGENTS Slm YANNİER Asf ŞABANOVİÇ Ahmt

More information

Mathematics. Mathematics 3. hsn.uk.net. Higher HSN23000

Mathematics. Mathematics 3. hsn.uk.net. Higher HSN23000 hsn uknt Highr Mathmatics UNIT Mathmatics HSN000 This documnt was producd spcially for th HSNuknt wbsit, and w rquir that any copis or drivativ works attribut th work to Highr Still Nots For mor dtails

More information

Rural and Remote Broadband Access: Issues and Solutions in Australia

Rural and Remote Broadband Access: Issues and Solutions in Australia Rural and Rmot Broadband Accss: Issus and Solutions in Australia Dr Tony Warrn Group Managr Rgulatory Stratgy Tlstra Corp Pag 1 Tlstra in confidnc Ovrviw Australia s gographical siz and population dnsity

More information

erkeley / uc berkeley extension Be YoUR Best / be est with berkeley / uc berkeley With BerkELEY exten xtension / be your best with berkele

erkeley / uc berkeley extension Be YoUR Best / be est with berkeley / uc berkeley With BerkELEY exten xtension / be your best with berkele c rkley xtnsion yor st w rkly c rkley xtnsion st with rkly c rkley xtn Crtificat yor Program st in with rkly c rk xtnsion yor st with rkl c rkley xtnsion yor st w rkly Financial c Planning rkley xtnsion

More information

Implied volatility formula of European Power Option Pricing

Implied volatility formula of European Power Option Pricing Impli volatility fomula of Euopan Pow Option Picing Jingwi Liu * ing hn chool of Mathmatics an ystm cincs, Bihang Univsity, LMIB of th Ministy of Eucation,, Bijing, 009, P.R hina Abstact:W iv th impli

More information

Wireless security. Any station within range of the RF receives data Two security mechanism

Wireless security. Any station within range of the RF receives data Two security mechanism 802.11 Security Wireless security Any station within range of the RF receives data Two security mechanism A means to decide who or what can use a WLAN authentication A means to provide privacy for the

More information

Executive Summary. This white paper includes the following sections: A.What Does 802.1x Do? B. An Overview of the 802.1x Standard

Executive Summary. This white paper includes the following sections: A.What Does 802.1x Do? B. An Overview of the 802.1x Standard Allied Telesis White Paper 802.1x White Paper Executive Summary Security and flexibility are often seen as mutually exclusive requirements in a network, yet both are equally important. Security is crucial

More information

Remote-scope promotion

Remote-scope promotion Rmot-scop promotion clarifid John Wickrson (Imprial), Mark Batty (Knt), Ally Donaldson (Imprial), Brad Bckmann (AMD) rctifid vrifid REMS workshop, Cambridg 22 April 2015 In brif RSP is a GPGPU languag

More information

Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2)

Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2) Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2) SUNY Technology Conference June 21, 2011 Bill Kramp FLCC Network Administrator Copyright 2011 William D. Kramp All Rights

More information

Designing of Closed Loop Controller for 3 Phase to 3 Phase Power Conversion Using Matrix Converter

Designing of Closed Loop Controller for 3 Phase to 3 Phase Power Conversion Using Matrix Converter Intnational Jounal of Scintific Engining an Tchnology Volum No.5 Issu No., pp: 11-115 ISSN:77-1581 1 Fb.1 Dsigning of Clos Loop Contoll fo Phas to Phas Pow Convsion Using Matix Convt 1 B.Muthuvl, K.C.Balaji,

More information

802.1X AUTHENTICATION IN ACKSYS BRIDGES AND ACCESS POINTS

802.1X AUTHENTICATION IN ACKSYS BRIDGES AND ACCESS POINTS APPLICATION NOTE Ref APNUS004 rev. A-0, March 08, 2007 802.1X AUTHENTICATION IN ACKSYS BRIDGES AND ACCESS POINTS Why? In addition to MAC address filtering, ACKSYS products support a more reliable authentication

More information

WIRELESS LAN SECURITY FUNDAMENTALS

WIRELESS LAN SECURITY FUNDAMENTALS WIRELESS LAN SECURITY FUNDAMENTALS Jone Ostebo November 2015 #ATM15ANZ @ArubaANZ Learning Goals Authentication with 802.1X But first: We need to understand some PKI And before that, we need a cryptography

More information

we secure YOUR network t i M c a t r n Compumatica Connected Security English

we secure YOUR network t i M c a t r n Compumatica Connected Security English ifoatio ad couicatio.th Cop k w cu YOUR twok Copuatica GSM id w d l wo Gatway R cu toag CopuMail U ail cu t xchag p O o cu aagt y C t i a pu cu ic u o U C S B co SMS 2 PN o V tw G d 3G ua G S u G M c to

More information

How To Create A Virtual Network With A Router And Network Operating System (Ip) For A Network (Ipv) (Ip V2) (Netv) And A Virtualization) (Network) (Wired) (Virtual) (Wire)

How To Create A Virtual Network With A Router And Network Operating System (Ip) For A Network (Ipv) (Ip V2) (Netv) And A Virtualization) (Network) (Wired) (Virtual) (Wire) Post-IP technologies virtualization and security Guy Pujolle 1 Virtualization for a post-ip network 2 Geni Intel would like to propose a generic router Intel proposes to have a generic hardware with virtual

More information

ACC-232 2002, Cisco Systems, Inc. All rights reserved.

ACC-232 2002, Cisco Systems, Inc. All rights reserved. 1 2 Securing 802.11 Wireless Networks Session 3 Session Information Basic understanding of components of 802.11 networks Please save questions until the end 4 Agenda Drivers for Wireless Security Wireless

More information

Department of Health & Human Services (DHHS) Pub. 100-04 Medicare Claims Processing Centers for Medicare &

Department of Health & Human Services (DHHS) Pub. 100-04 Medicare Claims Processing Centers for Medicare & anual ystm patmnt of alth & uman vics () Pub. 100-04 dica laims Pocssing nts fo dica & dicaid vics () Tansmittal 931 at: APL 28, 2006 ANGE EQUET 5013 UBJET: Billing quimnts fo Baiatic ugy fo Tatmnt of

More information

How To Secure Wireless Networks

How To Secure Wireless Networks Lecture 24 Wireless Network Security modified from slides of Lawrie Brown Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements

More information

Authentication and Security in IP based Multi Hop Networks

Authentication and Security in IP based Multi Hop Networks 7TH WWRF MEETING IN EINDHOVEN, THE NETHERLANDS 3RD - 4TH DECEMBER 2002 1 Authentication and Security in IP based Multi Hop Networks Frank Fitzek, Andreas Köpsel, Patrick Seeling Abstract Network security

More information

Key Management System Framework for Cloud Storage Singa Suparman, Eng Pin Kwang Temasek Polytechnic {singas,engpk}@tp.edu.sg

Key Management System Framework for Cloud Storage Singa Suparman, Eng Pin Kwang Temasek Polytechnic {singas,engpk}@tp.edu.sg Ky Managmnt Systm Framwork for Cloud Storag Singa Suparman, Eng Pin Kwang Tmask Polytchnic {singas,ngpk}@tp.du.sg Abstract In cloud storag, data ar oftn movd from on cloud storag srvic to anothr. Mor frquntly

More information

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2

More information

Every manufacturer is confronted with the problem

Every manufacturer is confronted with the problem HOW MANY PARTS TO MAKE AT ONCE FORD W. HARRIS Prodction Engineer Reprinted from Factory, The Magazine of Management, Volme 10, Nmber 2, Febrary 1913, pp. 135-136, 152 Interest on capital tied p in wages,

More information

Maintain Your F5 Solution with Fast, Reliable Support

Maintain Your F5 Solution with Fast, Reliable Support F5 SERVICES TECHNICAL SUPPORT SERVICES DATASHEET Maintain Your F5 Solution with Fast, Rliabl Support In a world whr chang is th only constant, you rly on your F5 tchnology to dlivr no mattr what turns

More information

Sharp bounds for Sándor mean in terms of arithmetic, geometric and harmonic means

Sharp bounds for Sándor mean in terms of arithmetic, geometric and harmonic means Qian t al. Journal of Inqualitis and Applications (015) 015:1 DOI 10.1186/s1660-015-0741-1 R E S E A R C H Opn Accss Sharp bounds for Sándor man in trms of arithmtic, gomtric and harmonic mans Wi-Mao Qian

More information

Authentication in WLAN

Authentication in WLAN Authentication in WLAN Flaws in WEP (Wired Equivalent Privacy) Wi-Fi Protected Access (WPA) Based on draft 3 of the IEEE 802.11i. Provides stronger data encryption and user authentication (largely missing

More information

C o a t i a n P u b l i c D e b tm a n a g e m e n t a n d C h a l l e n g e s o f M a k e t D e v e l o p m e n t Z a g e bo 8 t h A p i l 2 0 1 1 h t t pdd w w wp i j fp h D p u b l i c2 d e b td S t

More information

Outline. - The Trafo Project - 1. Introduction of GEF Ingenieur AG and Trafo Project. 2. Intregrating Renewables into the Jena District Heating System

Outline. - The Trafo Project - 1. Introduction of GEF Ingenieur AG and Trafo Project. 2. Intregrating Renewables into the Jena District Heating System omey Iaioal Cofc Dcmb,, - Th Tafo Pojc - iai Rwabls io xi Dic Hai Sysms Dipl.-I. (FH) Ssa Ochs GEF Ii AG Fdiad-Posch-S. a 9 im ifo@f.d www.f.d Oli. Iodcio of GEF Ii AG ad Tafo Pojc. Iai Rwabls io h Ja

More information

Keep Te d C u b e. TedCube

Keep Te d C u b e. TedCube Natual U Intfac f halthca Kp T d C u b Imagin cntlling yu PC with th wav f a hand. In ugi it man aving tim, incaing afty, impving infctin cntl, aviding ditactin... Nw thi i pibl with It Saf TdCub in Kp

More information

Wireless Technology Seminar

Wireless Technology Seminar Wireless Technology Seminar Introduction Adam Worthington Network Consultant Adam.Worthington@euroele.com Wireless LAN Why? Flexible network access for your users? Guest internet access? VoWIP? RFID? Available

More information

est with berkeley / uc berkeley exte xtension / be your best with berkel

est with berkeley / uc berkeley exte xtension / be your best with berkel c rkley xtnsion yor st rkly c rkley xtnsion st with rkly c rkley xt Post-Baccalarat yor st Program with for rkly c rk xtnsion yor st with rkl c rkley xtnsion yor st rkly Consling c rkley and xtnsion st

More information