Abstract:

The wonderful freedom of wireless networking is very tempting. Everyone is in a rush to join this technology in order to feed this freedom. However, isn't it too soon to accept this technology? Are there any risks that we have to trade for the freedom of wireless technology? What are the security risks? Industries try to convince us that it is very secure. Is it actually secure? Or do we just want to believe it is secure?

Research Question and Significance:

There are a number of questions that we will need to answer before implementing any system. First, How did wireless networking start, and how is it progressing? Included in these questions are the history of wireless networking, current wireless network technology (such as wireless phone technology, wireless LANs, and infrared networking), and future directions of wireless networking, for example, Bluetooth. Also of interest is determining if current security systems in wireless networking are safe. How it actually works and what problems exist in the current systems.

The actual research question is if we can improve security in wireless networks, we will need to research possible techniques that we can implement and current research topics being discussed in academia and industry.

Project Design and Feasibility:

Mostly, we will do research on the Internet and in the library. We will take a look at many journals that talk about wireless technologies. We will find one specific example of a wireless network security model and study how it works. Finally, with enough time, we will implement a new security scheme for wireless networking.

We will do research whenever we have free time. We will meet at least once a week in order to share the result of our research. Meanwhile, we will also communicate often using E-mail or messenger services to check our progress.

Background:

We each have taken a basic network class and have many programming skills. We have each used a wireless network of some sort to provide a common base for communication.

Presentation and Evaluation:

We will write a paper and give a short presentation. I believe Dr. Fu will evaluate our project. (or maybe the grader)

Dissemination of Knowledge:

We will post it on the web

Schedule

First status report (due October 21st) : Describe research on history, current technology, and current security and problem

Second status report (due November 18th) : Describe research on analyzing current problem, current research topic and start making image of our suggestion, possibly start coding

By final report (due December 20th) : Analyze more improved wireless network technology we can implement more specifically and possibly coding by the end of semester.

Back to project page