{"id":78576,"date":"2006-07-02T00:00:00","date_gmt":"2006-07-02T00:00:00","guid":{"rendered":"https:\/\/www.deberes.net\/tesis\/sin-categoria\/contribucion-a-la-seguridad-en-redes-wi-fi-802-11\/"},"modified":"2006-07-02T00:00:00","modified_gmt":"2006-07-02T00:00:00","slug":"contribucion-a-la-seguridad-en-redes-wi-fi-802-11","status":"publish","type":"post","link":"https:\/\/www.deberes.net\/tesis\/diseno-y-componentes-de-sistemas-de-informacion\/contribucion-a-la-seguridad-en-redes-wi-fi-802-11\/","title":{"rendered":"Contribuci\u00f3n a la seguridad en redes wi-fi 802.11"},"content":{"rendered":"<h2>Tesis doctoral de <strong> Salvador G\u00f3mez Pedraz <\/strong><\/h2>\n<p>La sociedad de la informaci\u00f3n ha pasado a ser un elemento fundamental en el progreso de las sociedades. Estos aspectos relacionados con la informaci\u00f3n y con la comunicaci\u00f3n segura de la misma, hacen que la mayor parte de las empresas tengan una dependencia directa de los medios que permitan intercambiar datos de forma din\u00e1mica con cualquier parte del mundo, sin demoras y con la seguridad de que los datos intercambiados respondan a los principios de la seguridad inform\u00e1tica: integridad, confidencialidad, disponibilidad y no repudio, as\u00ed como la accesibilidad. en los entornos rurales, o en n\u00facleos aislados existe un d\u00e9ficit en las tecnolog\u00edas que no permitan disponer de este tipo de comunicaciones. Para resolver este d\u00e9ficit se pueden introducir elementos tecnol\u00f3gicos basados en tecnolog\u00eda inal\u00e1mbrica, integrando sobre ellos los servicios ip; voz, fax, video y datos. en esta tesis doctoral se aborda la soluci\u00f3n a este aislamiento teniendo en cuenta las limitaciones de seguridad existentes en el conjunto de protocolos est\u00e1ndar ieee 802.11 a\/b\/g, y los ataques que se pueden realizar sobre las redes inal\u00e1mbricas. para solucionar el aspecto de seguridad se aborda la inclusi\u00f3n del agoritmo aes en una plataforma est\u00e1ndar 802.11 g, modificando el firmware para incluir los m\u00f3dulos que permitan solventar los problemas tanto de confidencialidad como de autenticaci\u00f3n e integridad. una vez validado el prototipo se realiza una instalaci\u00f3n en explotaci\u00f3n de la soluci\u00f3n desarrollada consiguiendo, de este modo, solventar de forma segura el problema de aislamiento de un centro de tecnolog\u00eda.<\/p>\n<p>&nbsp;<\/p>\n<h3>Datos acad\u00e9micos de la tesis doctoral \u00ab<strong>Contribuci\u00f3n a la seguridad en redes wi-fi 802.11<\/strong>\u00ab<\/h3>\n<ul>\n<li><strong>T\u00edtulo de la tesis:<\/strong>\u00a0 Contribuci\u00f3n a la seguridad en redes wi-fi 802.11 <\/li>\n<li><strong>Autor:<\/strong>\u00a0 Salvador G\u00f3mez Pedraz <\/li>\n<li><strong>Universidad:<\/strong>\u00a0 Alcal\u00e1<\/li>\n<li><strong>Fecha de lectura de la tesis:<\/strong>\u00a0 07\/02\/2006<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Direcci\u00f3n y tribunal<\/h3>\n<ul>\n<li><strong>Director de la tesis<\/strong>\n<ul>\n<li>Juan  Antonio Rodrigo Yanes<\/li>\n<\/ul>\n<\/li>\n<li><strong>Tribunal<\/strong>\n<ul>\n<li>Presidente del tribunal: manuel Lopez-amo sainz <\/li>\n<li>ricardo Ribagorda garnacho (vocal)<\/li>\n<li>Jos\u00e9 Luis Morante amos (vocal)<\/li>\n<li>benjamin Ramos alvarez (vocal)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tesis doctoral de Salvador G\u00f3mez Pedraz La sociedad de la informaci\u00f3n ha pasado a ser un elemento fundamental en el [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[17426,12500,4149,45251],"tags":[152817,168883,48285,28585,168882,168881],"class_list":["post-78576","post","type-post","status-publish","format-standard","hentry","category-alcala","category-codigo-y-sistemas-de-codificacion","category-diseno-y-componentes-de-sistemas-de-informacion","category-fiabilidad-de-los-ordenadores","tag-benjamin-ramos-alvarez","tag-jose-luis-morante-amos","tag-juan-antonio-rodrigo-yanes","tag-manuel-lopez-amo-sainz","tag-ricardo-ribagorda-garnacho","tag-salvador-gomez-pedraz"],"_links":{"self":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/78576","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/comments?post=78576"}],"version-history":[{"count":0,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/78576\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/media?parent=78576"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/categories?post=78576"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/tags?post=78576"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}