Research Topics

Wireless network security research topics

The following are some wireless network security research topics which can be used for developing research papers. Each topic is listed with appropriate research areas.

Title: Comparative study of 802.1x authentication protocols in a WLAN network


The project aims to understand the different types of 802.1x authentication protocols like PEAP, EAP-TLS, EAP-MD5 and perform a comparative study. The architecture and security limitation of each of the protocols are understood. The components which are required to setup an 802.1x WLAN network with the above protocols like Radius servers, supplicants, and access points are researched and analyzed.

Research areas:

1.Key derivation mechanism in the above protocols.
2.Security issues in EAP-TLS compared with PEAP.
3.The use of TLS protocol in PEAP and EAP-TLS.
4.Security issues in EAP-MD5 compared with PEAP and EAP-TLS.
5.Dependency on digital certificates for the use of the identified protocols in a WLAN network.

Title: Dynamic and static key management with WEP


The project aims to understand how WEP keys are derived in a static and dynamic environment. In a static environment, the shared WEP key is configured on the access point and the respective clients and per packet keys are derived using the shared base keys. In a dynamic environment, when protocols like PEAP, EAP-TLS with radius servers are used, WEP keys are derived automatically using appropriate protocols. The security issues and challenges which are faced in both the scenarios are understood.

Research areas:

1.How base keys are derived and used in static and dynamic environment.
2.How TLS is used to derive session keys.
3.The different types of keys involved in dynamic WEP like Pre-master secret, PMK etc.
4. Comparative study of security issues with static and dynamic WEP.
5.Infrastructure requirements for static and dynamic WEP.

Title: Defeating unauthorized wireless access using mac-addresses.


The project aims to understand how unauthorized wireless access can be defended using mac-filtering feature on access points. The design of the mac-filtering feature is understood and how it can be implemented with and without a radius server is understood.

Research areas:

1.How does mac-based authentication work
2.Mac-filtering feature on the access point.
3.Mac-based authentication with mac-address database on a radius server.
4.Comparative study of mac-filtering and mac-based authentication.
5.Security issues with mac-filtering and how it can be bypassed.

Title: Secure wireless infrastructure design with Windows Active directory and IAS server.


The project understands how a Windows Active directory can be used for user based wireless authentication in conjunction with an IAS server. The components which are required to setup a fully fledged wireless network like supplicants, authenticator, and authentication server are understood.

Research areas:

1.Supplicant software like Windows wireless Zero config, Open X and which would be a better solution.
2.Different access points which supports radius server authentication and able to read information from the Active directory for user authentication.
3.Radius server redundancy mechanism.
4.Authentication protocols which can be used between the access point and the IAS server.
5.Protocols which can be used by the wireless clients like EAP-MD5, PEAP, EAP-TLS and the infrastructure requirements for the same like having a certificate authority.

Title: Security assessment of home wireless network.


The project aims to understand the different security issues in a home network like unsecured wireless access, default username and password for access points, weak encryption protocols like WEP etc. and how to perform an assessment on the same.

Research areas:

1.Use of wireless scanners like netstumbler, Kismet etc to find out the name of the access point and encryption protocol used and identify insecure access points
2. How to use fingerprinting mechanism to identify the access point vendor.
3.Migration from WEP to WPA.
4.How to find default admin username and passwords for the identified access point with Google search.
5.Prepare a test plan, which details on the test cases which needs to be conducted for a comprehensive security assessment.

Custom Paper Help – Click Here

Best Sellers and Latest Reports

Information security research topics

The following are some information security research topics which can be used for projects and papers

1. Security of credit card transactions on the internet.

Read more »

Research topics in network security

The following are some network security research topics for projects and papers in network security.

1. Defeating TCP Syn flooding with TCP Syn cookies.

Read more »

Network Security topics

The following are some network security topics which can be used to develop papers, projects or presentation.

1.Study on network and application firewalls.
2.Vulnerabilities of Spanning tree protocol and mitigation.
3.Methodologies to prevent IP fragmentation attacks.
4.Attacks based on a VLAN infrastructure.
5.Preventing Rogue DHCP servers on the network.
6.Defeating DDOS attacks with hosted solutions.
7.Perimeter router configuration to block IP spoofing attacks
8.Defeating TCP scan attacks with security solutions
9.ICMP based attacks and defense with Access control lists.
10.Bypassing web filters on the network.
11.Comparative study of stateless and statefull firewalls.
12.Analysis of DDOS attacks and techniques
13.Security issues in DHCP protocol.
14.Comparative study of access control mechanisms
15.Practical analysis of Access control lists.
16.Dynamic key derivation on the internet with SSL
17.Security threats on IPSEC Infrastructure
18.Security analysis of routing protocols.
19.Layer 2 security threats and mitigation
20.Crafting tools for security testing
21.Comparative study of Layer 2 and Layer 3 VPN.
22.LAN network vulnerability assesment techniques.
23.DNS Infrastructure security testing
24.Secure LAN application servers using security features.
25.Mitigating TCP Syn flood on Operating systems.
26.Crafting tools for penetration testing.
27.Brute force attacks on Web servers.
28.Router access control techniques.
29.IPSEC Key derivation – a detailed analysis
30.Designing secure networks for public web servers.

If a custom report is required for the above title, email us with your requirement

Best Sellers and Latest Reports – Click Here