Vous êtes sur la page 1sur 4

Cover Page


A Partial Synopsis for Dissertation submitted

By student



In partial fulfilment of the Requirement for the

Award of the Degree of

Master of Technology in

Under the guidance of

(Advisor) Month Year

Broad Area of Research

There is a surge of interest today in Wireless Networks both for organizations and individuals. Its emerging as general consensus that the current generation as well as next generation will have more of wireless connectivity. The fact is being proved by one of the statistics which says that more than 95% of corporate laptops being sold are equipped with wireless technology. The ability to enter a network while mobile has great benefits. However, wireless networking has many security issues. Effective Wireless Security policies are required as wireless networks have been found to be relatively easy to break in by the hackers. As wireless technology is becoming more & more popular the risk to users is also increasing. There are great number of security risks associated with the current wireless protocols and encryption methods, and also the carelessness and ignorance exists at the user and corporate IT level that makes the Wireless N/Ws more vulnerable to security risks. Cracking methods have become much more sophisticated and innovative with wireless. A lot of free tools available on web have made Cracking much easier and more accessible. Various type of unauthorized access like accidental association, malicious association at layer 2, MAC spoofing, Man-in-the middle attacks, DOS attacks, N/W injections, Caffe latte attacks etc. can be harmful for wireless N/Ws. Even Ad-hoc N/Ws and Non traditional N/Ws like Personal network Bluetooth devices are not safe from cracking & should be regarded as security risk. The various techniques are being used for counteracting security risks. Few of these are: MAC ID filtering, static IP addressing, 802.11 & 802.11i security protocols, regular WEP, WPAv1 & v2, TKIP, LEAP, EAP & other EAPs, WAPI & RF shielding etc. No technology as a standalone is good enough to counteract wireless network intrusion. The better strategy may be to combine a number of security measures but all this also effect the throughput of network. My area of research will concentrate on the issues related with Privacy & Security of local area Wireless Networks & to propose an efficient solution for the same.

Literature Survey
Boetticher et al., (1993) assimilated knowledge about object oriented concepts, analysis and design. Explanation of various object-oriented metrics was also given such as class oriented metrics (CK metric), metrics for source code, testing, analysis model and design model. Advantages and disadvantages of each object-oriented metric was explained. Information regarding theoretical background of the reusability of software and Object oriented metrics for measuring size, complexity are also given in this reference. Boetticher et al., (1993) discussed various approaches for measuring software reusability, to build reusable components and to identify useful modules in existing programs. Taxonomy of reusability metrics was given which provide the attributes of reusable software. Two main methods are there to measure the reusability. One is Empirical methods stress objective, numerical, and repeatable metrics, such as those obtained by observing the module complexity or size. Other is Qualitative methods included (or even emphasized) subjective criteria, such as how well a module complies with a set of style, certification, quality guidelines, or simply agrees with the opinions of "experts." These are further divided into two categories module oriented and component oriented. Kartalopoulos, S. V. (1996) discussed REBOOT (reusability based on object oriented technique) that develop a taxonomy of reusability attributes. It provided reusability factors, a list of criteria for factor and a list of metrics for each criteria. Various object oriented concepts were defined in this paper, which are useful for finding the reusability. Information about software reuse, types of software reuse, requirements for building software reuse and management issues toward reusable software were also given. This also shows the advantages of this technique over other methods.

Anderson, J.A (2003) An Introduction To Neural Networks, Prentice Hall of India, 2nd Ed, CA, pp. 44-56.
Arnold, R.S. (1990) Heuristics for Salvaging Reusable Parts From Adav Code, SPC Technical Report, ADA_REUSE_HEURISTICS-90011-N, vol. 22, issue 3, pp. 11 - 28. Arnold, R.S. (1990) Salvaging Reusable Parts From Ada Code: A Progress Report, SPC Technical Report, SALVAGE_ADA_PARTS_PR-90048-N, vol. 21, issue 2, pp. 44 - 49.