You are on page 1of 6

Wi-Fi Security: Protecting Insecure Channels

Outline: 1. Title page - Name, Capstone Project title, date, advisor and course instructor. 2. Abstract - Concise description of principle accomplishments or results. 3. Copyright page 4. Introduction - Includes background (text the reader needs to know to understand the research work), context (what has been done or is currently being done by others, and how the student contribution fit together with and contribute to previous efforts?), and motivation (why is this research study important?). 5. Methodology Description of the technical details of the student works that has been reviewed by experts in the field. 6. Results and Discussion Explanation of the data and observations gathered in the research and their interpretation. This also includes the discussion of the data, the significance and relation to a broader context. Results and discussion sections can be put together or placed in separate paragraphs as per the student choice. 7. Conclusions Includes summary of the main conclusions of the research work and possibly suggest future research directions. 8. References Includes bibliographic references to existing literature described in the introduction. The format of the reference section should be that directed by the advisor. 9. Acknowledgements To contributors and others.

The below are the references for Wi-Fi Security: Protecting Insecure Channels project. The below references will help you to get start working on writing the project of 30 pages.

1) Background

http://www.sysdesign.ca/archive/networksecurity2009.pdf http://www.wlug.org/files/wifi-security.pdf

2) Methodology

Page 1 of 6

Wi-Fi Security: Protecting Insecure Channels

http://books.google.ae/books? id=eZ4cCsfaXyUC&pg=PA48&dq=advantages+and+disadvantages+Prima ry+Research+method&hl=en&sa=X&ei=qw2AT_ipDuOQ0AWWzsnpBg&re dir_esc=y#v=onepage&q=advantages%20and%20disadvantages %20Primary%20Research%20method&f=false

http://books.google.ae/books? id=wY2bSaEm8l8C&pg=PA127&dq=advantages+and+disadvantages+Pri mary+Research+method&hl=en&sa=X&ei=qw2AT_ipDuOQ0AWWzsnpBg &redir_esc=y#v=onepage&q=advantages%20and%20disadvantages %20Primary%20Research%20method&f=false

3) Findings

http://mysbfiles.stonybrook.edu/~mlayer/cse102/HW3.html http://www.openitmag.com/2011/07/wi-fi-security/ http://www.guardmyip.com/wifi-hotspot-security.html http://www.complexnetworks.fr/security-modes-of-wi-fi-access-points-inparis/

http://fanaticmedia.com/infosecurity/archive/Feb10/5-Wireless-SecurityThreats_v2.htm

http://infosecawareness.in/downloads/handbooks/wifi-security-ebook.pdf

Page 2 of 6

Wi-Fi Security: Protecting Insecure Channels

http://java.uom.gr/~chalkias/e107_files/public/wifisecurity_FINAL_chalkias.pdf

http://books.google.ae/books? id=rLRgMdjwzxsC&pg=PA57&dq=Wifi+Security: +Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_ 5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting %20insecure%20Channels&f=false

http://www.hsc.fr/ressources/articles/hakin9_wifi/hakin9_wifi_EN.pdf http://books.google.ae/books? id=QuISwdREL1sC&pg=PT425&dq=Wifi+Security: +Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_ 5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting %20insecure%20Channels&f=false

http://www.airtightnetworks.com/fileadmin/pdf/resources/WiFi_Security_Be st_Practices.pdf

http://books.google.ae/books?id=T7RRtAxRJ8C&pg=PA326&dq=Wifi+Security: +Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_ 5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting %20insecure%20Channels&f=false

http://www.staysmartonline.gov.au/__data/assets/pdf_file/0004/19525/F17 _wi-fi_security.pdf

Page 3 of 6

Wi-Fi Security: Protecting Insecure Channels

http://books.google.ae/books? id=UDE_T26hBm4C&pg=PA413&dq=Wifi+Security: +Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_ 5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting %20insecure%20Channels&f=false

http://cdn.ttgtmedia.com/rms/pdf/Manager%E2%80%99s%20Guide%20to %20Wi-Fi%20security%20policies.pdf

http://books.google.ae/books? id=EATgHiGtCc4C&pg=PA26&dq=Wifi+Security: +Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_ 5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting %20insecure%20Channels&f=false

http://books.google.ae/books? id=mzkEAAAAMBAJ&pg=PA10&dq=Wifi+Security: +Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_ 5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting %20insecure%20Channels&f=false

http://books.google.ae/books? id=0RfANAwOUdIC&pg=PA92&dq=Wifi+Security: +Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_ 5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting %20insecure%20Channels&f=false

http://books.google.ae/books? id=UE2wEc9NfB8C&pg=PA409&dq=Wifi+Security:

Page 4 of 6

Wi-Fi Security: Protecting Insecure Channels


+Protecting+insecure+Channels&hl=en&sa=X&ei=yAqAT_voDGj0QXmytmFBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A %20Protecting%20insecure%20Channels&f=false

http://books.google.ae/books? id=f24wFELSzkoC&pg=PA5&dq=Wifi+Security: +Protecting+insecure+Channels&hl=en&sa=X&ei=yAqAT_voDGj0QXmytmFBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A %20Protecting%20insecure%20Channels&f=false

http://books.google.ae/books? id=UE2wEc9NfB8C&pg=PA409&dq=Wifi+Security: +Protecting+insecure+Channels&hl=en&sa=X&ei=yAqAT_voDGj0QXmytmFBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A %20Protecting%20insecure%20Channels&f=false

http://books.google.ae/books? id=VYlm5qzXUscC&pg=PA318&dq=Wifi+Security: +Protecting+insecure+Channels&hl=en&sa=X&ei=FAuAT__jImg0QWj6ZWOBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A %20Protecting%20insecure%20Channels&f=false

http://books.google.ae/books?id=XI52jezaW8C&printsec=frontcover&dq=Wifi+Security: +Protecting+insecure+Channels&hl=en&sa=X&ei=XguAT9_KDaSv0QWMi Nj8Bg&redir_esc=y#v=onepage&q&f=false

http://bcm-india.org/wifiBooklet.pdf

Page 5 of 6

Wi-Fi Security: Protecting Insecure Channels

http://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16de_bouvette-farina.pdf

http://csrc.nist.gov/archive/wireless/S02-Opening%20remarks-tg.pdf

Page 6 of 6