Search In this Thesis
   Search In this Thesis  
العنوان
A Proposed Mechanism for Securing Remote Information Exchange among Computer Nodes /
المؤلف
Ahmed, Mervat Hely Hussein.
تاريخ النشر
2008
عدد الصفحات
1 VOL. (various paging’s) :
الفهرس
يوجد فقط 14 صفحة متاحة للعرض العام

from 298

from 298

المستخلص

Remote computers that contain sensitive information that can be exchanged among computer nodes need to be secured. There must be a mechanism for securing the remote information among those computers. Security can be achieved when applied in any of the protocol layers in the Internet Protocol Suite
Commercial PPP systems might come with their inbuilt backdoors that allow unauthorized people to gain access to the network and violate its security. This research put more emphasis on layer two ”Point-to-Point Protocol (PPP). It has been used for remote bridging. LAN identification, and network nodes authentication. It provides a standard method for transporting multi-protocol datagrams over point-to- point links.
Accordingly, the research aims at building a set of Point-to-Point authentication programs to establish a private authentication mechanism between users of a given network. Those authentication programs will act as an additional secured layer in that network
In order to do that, the researcher built an application using Microsoft Visual Basic programming codes and several Application Programming Interfaces (APIs) to communicate between the system’s operating system and the connected network.
The application establishes a communication link based on PPP with several modifications such as Protocol Identifier that has been changed. Additionally, authentication data embedded in packets using both Medium Access Control (MAC) address and IP address ”Real and Virtual” in that authentication mechanism
Additionally, the system uses an encryption module flexible enough to be replaced by any other module according to user requirements and a scrambling mechanism that is replaceable if needed without affecting the system.
The system has been implemented and tested in real life environment and stood the scrutiny.