Skip to main content

جائزة البحث العلمى فى مجال الاتصالات2009

Page 1

816

86

Scientific Society of Telecom Engineers

SSTE

2009 ‍ ŘŠ ŘŁ  Ů„ ا ŘŞ م‏ ‍ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‏

65‍ ذďť?‏85 9 0‍ Ůˆ ďť?â€ŹŘŒ ‍ ت‏5 ‍ ا‏%)(# ‍ي اďť?! ďť?‏/0$ ‍ اďť?‏1 2 ‍ م‏0‍ ا ه‏1986 ‍ م‏#$ %& '(‍ ا ŘŞ ‏%)(# ‍دأ اďť? ! اďť?! ďť?‏ (5 ‍ آ‏5#0 ‍ ŘŞ ŮˆŘŁŮ‡â€Ź5 ‍ ا‏5%)(‍ ŘŻŮˆŘą ه‏AB !0‍ا ďť?‏2C‍ Ůˆâ€ŹŘŒ ‍ =)Ů…  Ů„ ا ت‏0‍؍ اďť?‏/ Fâ€ŤŰŒ ? اďť?‏/(% ‍=ــ < ؊‏0 ! ‍;  اďť?‏ 5%)(#‍ ŘŞ اďť?‏5 ‍ آ‏5 5 2#Q‍ ŘŞ اďť?‏5 ‍ Ů… ا‏5$;& ( ‍س‏/â€ŤŘąŰŒâ€Ź/‍ ďť?‏5QF‍ ) اďť?‏5 #(‍( اďť?‏5$‍ب اďť?‏LM‍ ﺥ ŘŁŰŒ ďť?‏0‍ اďť? ŘŠ ‏H'#‍)Ů… ďť?‏90‍ اďť?‏IF‍ ŘŁďşšâ€ŹŘŒ H) ‍ Ůˆا‏H)‍ )ŰŒâ€Ź 5‍) ; ‏59‍ Ůˆďť?â€ŹŘŒ ‍ ت‏5 ‍ Ů„ ا‏5 ‍ ‏5 )5‍ )ŰŒâ€Ź/‍ آ  ه‏2!‍ Ůˆ‏U 9(0‍ Ůˆاďť?‏F‍ Ů… ďť?‏0‍ ا ه‏- F90$ ‍ اďť?‏%)(‍ـ‏#‍ ‏- ‍ب‏LM‍ ďť? اďť?‏6‍ Ůˆذďť?‏S 0= ‍اďť?‏ ‍ ذ‏05%?‍ ) ا‏5$‍ا اďť?‏/5 ‍ اďť?‏A‍)ŰŒâ€Ź590 ‍ م‏5;‍ Ůˆâ€ŹŘŒ 2001 -ICT-â€ŤŮˆâ€Ź2‍ ŰŒâ€Ź5‍ آ‏2 X5‍ ŘŞ ‏5 ‍ إ‏5(Z‍ أ‏65‍ Ůˆذďť?‏2001 ‍ م‏5 ‍ـ‏5 ‍؊‏25‍ ŰŒ ?ŮˆŮ„ ‏5S‍ اďť?‏Aâ€ŤŰŒâ€Ź25Q0 ! ‍اďť?‏ EED ‍ى‏2 ‍ اďť?‏%)(#‍م اďť?‏/‍أ ŰŒâ€Ź2‍ﺼ‏Xâ€ŤŮˆ‏.‍ ت‏/ ! ‍ ا ŘŞ Ůˆاďť?‏2‍ ŮˆزŰŒâ€Ź/ ‍ع‏/0‍اďť?)آ‏

5%)(#‍ ŘŞ اďť?‏5 ‍) آ‏5‍ ŘŞ &ﺥ‏5 ‍ ا‏5%)(‍ ه‏A5$9 5 #(‍( اďť?‏5$‍ب اďť?‏L5a 5‍ن ‏/5Q‍ ŘŞ ŘŁŮˆ أن ŰŒâ€Ź5 ‍< ا‏5 = 5 5%)(#‍)Ů… ‏590 ‍ن اďť?‏/Q‍ أن ŰŒâ€ŹU â€ŤŰŒâ€Ź ‍ن‏/5Q‍ زŮˆان ŰŒâ€Ź9 5$‍؍ اďť?‏Lb5‍ات اďť?‏/(5$‍ل اďť?‏L5‍ى ﺼ‏25‍ ŘŠ اﺼ‏5 ‍ اŮˆâ€Ź5 5 ‍ دع‏c5 ‍ل‏/5 ‍ ďť?‏5 ‍)م‏90‍ اďť?‏8F$‍ ŰŒâ€ŹA‍ )ŰŒ) Ůˆďť?‏F‍اďť?‏. â€ŤŰŒâ€Ź2 ‍ ďť? ! ŘŞ اďť?‏ . #( ! ‍ ŘŞ اďť?‏/‍ﺽ‏/ ‍( ŮˆŮ„ اﺥ) اďť?‏0 ‍ اﺚ Ůˆâ€ŹF‍اďť?‏

( Securing Wireless Communication Networks)

Q %L‍ ŘŞ ا ŘŞ اďť?‏QFe ‍ &‏-1

Businesses, individuals and public administrations still underestimate the risks of insufficiently protecting networks and information. However, as enterprises increasingly are using wireless devices to create and transmit new data and to access the most sensitive information sitting on their corporate servers, the risks are much greater, the stakes are much higher, and potential loss is much more catastrophic. A good research in this are could address on the following topics: 1- Cellular Mobile Security 2- Wireless LAN Security 3 – Bluetooth Security : ‍ـ ŘŞ ŮˆŘą ا‏ • • •

Identification of security threats and their risks Security techniques used in each type of network (e.g. : A3, A5, A8, IEEE802.1x (EAP), WEP, IEEE802.11i, WPA, ‌ , etc) Current status of wireless network vulnerability.

( Convergence of Communication Networks) ‍ ŘŞ ا ت‏QFe ‍ عب‏90‍ اďť?‏-2

In today's society one can communicate with a friend via mail, online chatting, fixed telephone, mobile phones and many other forms of modern technology. Though the forms of technology are all very different, they all essentially provide the same basic service: person-to-person communication. The


Turn static files into dynamic content formats.

Create a flipbook
جائزة البحث العلمى فى مجال الاتصالات2009 by الجمعية العلمية لمهندسى الاتصالات - Issuu