Wireless security for secure facilities

dc.contributor.author Mitchell, DeAntrious
dc.contributor.department Department of Electrical and Computer Engineering
dc.date 2020-07-17T07:20:32.000
dc.date.accessioned 2021-02-26T08:31:50Z
dc.date.available 2021-02-26T08:31:50Z
dc.date.copyright Wed Jan 01 00:00:00 UTC 2003
dc.date.issued 2003-01-01
dc.description.abstract <p>This thesis presents methods for securing a facility that has wireless connectivity. The goal of this research is to develop a solution to securing a facility that utilizes wireless communications. The research will introduce methods to track and locate the position of attackers. This research also introduces the idea of using a Honeynet system for added security. This research uses what is called Defense-In-Depth. Defense-in-depth is when multiple layers of security are used. The first of the layers is the Zone of Interference. This Zone is an area where jammer transmitters and directive antennas are set up to take advantage of the near-far-effect. The idea is to use the near-far-effect to give a stronger signal on the perimeter of the secure area, to mask any signals escaping from the secure area. This Zone uses directive Yagi antenna arrays to direct the radiation. There are multiple jamming methods that are utilized within this Zone. The next layer of security is the Honeynet Zone. The idea is to make an attacker believe that they are seeing real network traffic. This is done at the Honeynet Zone once a device has been determined to be unfriendly. Decoy mobile devices are first placed within the Honeynet Zone. Spoofed traffic is then created between the Honeynet base stations and the decoy mobile devices zone; using adaptive antennas incorporated within the design to face the signals away from the inside secure area. The third defense is position location and tracking. The idea is to have constant tracking of all devices in the area. There are several methods available to locate and track a device that is giving off an RF signal. This thesis looks at combining all these methods into an integrated, and more robust, facility security system.</p>
dc.format.mimetype application/pdf
dc.identifier archive/lib.dr.iastate.edu/rtd/19507/
dc.identifier.articleid 20506
dc.identifier.contextkey 18549530
dc.identifier.doi https://doi.org/10.31274/rtd-20200716-74
dc.identifier.s3bucket isulib-bepress-aws-west
dc.identifier.submissionpath rtd/19507
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/96874
dc.language.iso en
dc.source.bitstream archive/lib.dr.iastate.edu/rtd/19507/Mitchell_ISU_2003_M58.pdf|||Fri Jan 14 21:57:25 UTC 2022
dc.subject.keywords Electrical and computer engineering
dc.subject.keywords Computer engineering
dc.subject.keywords Information assurance
dc.title Wireless security for secure facilities
dc.type thesis en_US
dc.type.genre thesis en_US
dspace.entity.type Publication
relation.isOrgUnitOfPublication a75a044c-d11e-44cd-af4f-dab1d83339ff
thesis.degree.discipline Computer Engineering; Information Assurance
thesis.degree.level thesis
thesis.degree.name Master of Science
File
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Mitchell_ISU_2003_M58.pdf
Size:
1.37 MB
Format:
Adobe Portable Document Format
Description: