A secure wireless network architecture proposal to be used by governments in case of emergency situations

Download
2007
Aksoy, Mustafa
Since wireless network technology has advanced swiftly and dropped in price, it became a widely used networking option among numerous organizations and even single home users. In spite of their widespread usage by private sector, wireless networks are still undesired alternative for the governments due to security concerns. Although wireless networks possessed lots of proven and documented security flaws at first, with the latest researches and developments this condition ameliorated by the time and wireless networks became much more robust to various security attacks. In this thesis, a secure wireless network architecture that will allow exchange of unclassified information, using 802.11 (Wi-fi) and 802.16 (WIMAX), will be proposed that could be established by governments in case of emergency situations, namely natural disasters or wars, where cable infrastructure becomes unavailable.

Suggestions

A complex event processing framework implementation using heterogeneous devices in smart environments
Kaya, Muammer Özge; Eren, Pekin Erhan; Department of Information Systems (2012)
Significant developments in microprocessor and sensor technology make wirelessly connected small computing devices widely available; hence they are being used frequently to collect data from the environment. In this study, we construct a framework in order to extract high level information in an environment containing such pervasive computing devices. In the framework, raw data originating from wireless sensors are collected using an event driven system and converted to simple events for transmission over a...
A method for providing energy efficient neighborhood maintenance in MANETs
Ünlü, Berk; Özceylan, Baver; Baykal, Buyurman (2016-12-05)
Mobile ad-hoc networks (MANETs) are widely employed in many wireless networks, e.g. tactical area networks, due to its several advantages. Most of the MANETs must meet certain quality of service requirements such as high link reliability, low energy consumption and high throughput. However, major issues like interference dramatically degrade the service quality. In order to provide a high quality of service, an efficient control protocol, which handles the interference problem in neighborhood maintenance wh...
Analysis of electronic signature in Turkey from the legal and economic perspectives and the awareness level in the country
İskender, Gökhan; Koçyiğit, Altan; Department of Information Systems (2006)
As in the case of other information technologies, the best way of obtaining efficient results from electronic signature application is integrating it to the legal and economic systems and increasing the awareness level of technology in the society. This thesis performs the legal and economic analyses of electronic signature in Turkey and measures the awareness level in the society. The analyses performed in the thesis show that electronic signature is not legally established in Turkey even the legal base is...
Awlp: building a custom wireless access point using open source software
Çakırcalı, Alptekin; Baykal, Nazife; Department of Information Systems (2005)
Almost all commercially available wireless access devices are special embedded systems with proprietary software that do not allow any modifications. Modifications to these systems are only possible by firmware upgrades released by manufacturers. However, release times of these firmware upgrades are unpredictable, and they are usually for bug-fix purposes rather than being feature and capability improvements. Thus, these devices fail to provide the needed flexibility. Ability to provide timely custom soluti...
Attack tree based information technology security metric integrating enterprise objectives with vulnerabilities
Karabey, Buğra; Baykal, Nazife; Department of Information Systems (2011)
Security is one of the key concerns in the domain of Information Technology systems. Maintaining the confidentiality, integrity and availability of such systems, mandates a rigorous prior analysis of the security risks that confront these systems. In order to analyze, mitigate and recover from these risks a metrics based methodology is essential in prioritizing the response strategies to these risks and also this approach is required for resource allocation schedules to mitigate such risks. In addition to t...
Citation Formats
M. Aksoy, “A secure wireless network architecture proposal to be used by governments in case of emergency situations,” M.S. - Master of Science, Middle East Technical University, 2007.