Approved
|
Pending +
|
DueDate
|
2 May 2018 +
|
Keywords
|
SCOTT:SCOTT +
|
Methods
|
The tools and methods in this thesis are b … The tools and methods in this thesis are based on
* A set of scenario, describing the challenges
* A list of requirements being extracted from the scenarios
* A description and evaluation of technologies and tools being candidates for solutions
* A functional architecture/description of the envisaged system
* An implementation of the core concepts
* A demonstration of the solution
* An evaluation of the solution, including a critical review of the descisions taken earlier
* Conclusions
* Referencess taken earlier
* Conclusions
* References +
|
Objective
|
We have seen a variety of cities providing … We have seen a variety of cities providing free wifi for their inhabitants. However, when providing the full Internet without authentication, you run the risk of criminal activities to happen using that free Wifi. When you run authentication, it makes access cumbersome. Thus, the idea is to provide free low-capacity Internet without authentication, which would allow you to only consume information (no file download, no gaming, no streaming/video). With the knowledge of risk assessment, the candidate should be able to evaluate the security of such an open access.luate the security of such an open access. +
|
Pre-Knowledge
|
This thesis addresses security issues, thus the user should have a reasonable understanding of security mechanisms, e.g. through followed at least two radio-related courses +
|
Schedule
|
The envisaged time schedule (for a long th … The envisaged time schedule (for a long thesis/60 ECTS) is:
:T0 0 starting month, T0+m denotes the month where the contribution to a certain chapter shalle be finalized
:T0+2 months: create an initial page describing the scenario
:T0+3: Provide a list of technologies which you think are necessary for the thesis
:T0+4: Establish the table of content (TOC) of the envisaged thesis. Each section shall contain 3-10 keywords describing the content of that section
:T0+7: Provide a draft of section 2 (scenario) and 3 (technologies)
:T0+10: Establish a draft on what to implement/architecture
:T0+11: Set-up an implementation, testing and evaluation plan
:T0+15: Evaluate your solution based on a set of parameters, keep in mind <i>there is no such thing as a free lunch</i>
:T0+17: Deliver the thesislunch</i>
:T0+17: Deliver the thesis +
|
Supervisor
|
Josef Noll +
, György Kálmán +
|
ThesisStatus
|
Finished +
|
Titel
|
Security challenges of open low-capacity wifi access +
|
User
|
Naji Ahmed Kadah +
|
Creation dateThis property is a special property in this wiki.
|
9 April 2016 10:24:47 +
|
Categories |
Thesis +
|
Modification dateThis property is a special property in this wiki.
|
20 November 2018 15:24:21 +
|