Platonenko A. Techodology of providing functional security for wireless communication systems based on the improvement of the password policies

Українська версія

Thesis for the degree of Candidate of Sciences (CSc)

State registration number

0419U004678

Applicant for

Specialization

  • 05.13.06 - Інформаційні технології

29-10-2019

Specialized Academic Board

Д 26.255.01

Institute of telecommunications and global information space of National Academy of Sciences of Ukraine

Essay

The dissertation is devoted to the solution of the actual scientific problem, which consists in providing functional security for wireless communication systems on the basis of improvement passwords corporate policies. Object of study is the process of ensuring the functional security of wireless communication systems. The subject of the research is information technology for ensuring the functional security of wireless systems in the conditions of threats and restrictions determined by the specific conditions of such systems operation. The novelty of the work lies in the further development of theoretical and practical methods and models for ensuring the functional security of wireless systems based on the improvement of password policies through: - developing and validating solutions to improve password policies in wireless systems, as opposed to similar ones, by assessing the degree of closeness between the basic method of password generation and each unlike any of the many existing password-generating methods, choose the method that is most streamlined in terms of improving it and ensure the functional security of wireless systems in the face of cyber-attack; - improving the method of generating random passwords for wireless systems by taking into account the ability to match the passwords of the vocabulary system and using an integrated approach to generate more stable passwords by length and character set (chosen by the combination rule with some complication), compared to its counterparts, the IEEE 802.11 wireless security system is increased by 3.73∙104 times from possible hacking (unauthorized access attempts).

Files

Similar theses