جائزة البحث العلمى فى مجال الاتصالات2009

Page 1

816

86

Scientific Society of Telecom Engineers

SSTE

2009 ‍ ŘŠ ŘŁ  Ů„ ا ŘŞ م‏ ‍ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‏

65‍ ذďť?‏85 9 0‍ Ůˆ ďť?â€ŹŘŒ ‍ ت‏5 ‍ ا‏%)(# ‍ي اďť?! ďť?‏/0$ ‍ اďť?‏1 2 ‍ م‏0‍ ا ه‏1986 ‍ م‏#$ %& '(‍ ا ŘŞ ‏%)(# ‍دأ اďť? ! اďť?! ďť?‏ (5 ‍ آ‏5#0 ‍ ŘŞ ŮˆŘŁŮ‡â€Ź5 ‍ ا‏5%)(‍ ŘŻŮˆŘą ه‏AB !0‍ا ďť?‏2C‍ Ůˆâ€ŹŘŒ ‍ =)Ů…  Ů„ ا ت‏0‍؍ اďť?‏/ Fâ€ŤŰŒ ? اďť?‏/(% ‍=ــ < ؊‏0 ! ‍;  اďť?‏ 5%)(#‍ ŘŞ اďť?‏5 ‍ آ‏5 5 2#Q‍ ŘŞ اďť?‏5 ‍ Ů… ا‏5$;& ( ‍س‏/â€ŤŘąŰŒâ€Ź/‍ ďť?‏5QF‍ ) اďť?‏5 #(‍( اďť?‏5$‍ب اďť?‏LM‍ ﺥ ŘŁŰŒ ďť?‏0‍ اďť? ŘŠ ‏H'#‍)Ů… ďť?‏90‍ اďť?‏IF‍ ŘŁďşšâ€ŹŘŒ H) ‍ Ůˆا‏H)‍ )ŰŒâ€Ź 5‍) ; ‏59‍ Ůˆďť?â€ŹŘŒ ‍ ت‏5 ‍ Ů„ ا‏5 ‍ ‏5 )5‍ )ŰŒâ€Ź/‍ آ  ه‏2!‍ Ůˆ‏U 9(0‍ Ůˆاďť?‏F‍ Ů… ďť?‏0‍ ا ه‏- F90$ ‍ اďť?‏%)(‍ـ‏#‍ ‏- ‍ب‏LM‍ ďť? اďť?‏6‍ Ůˆذďť?‏S 0= ‍اďť?‏ ‍ ذ‏05%?‍ ) ا‏5$‍ا اďť?‏/5 ‍ اďť?‏A‍)ŰŒâ€Ź590 ‍ م‏5;‍ Ůˆâ€ŹŘŒ 2001 -ICT-â€ŤŮˆâ€Ź2‍ ŰŒâ€Ź5‍ آ‏2 X5‍ ŘŞ ‏5 ‍ إ‏5(Z‍ أ‏65‍ Ůˆذďť?‏2001 ‍ م‏5 ‍ـ‏5 ‍؊‏25‍ ŰŒ ?ŮˆŮ„ ‏5S‍ اďť?‏Aâ€ŤŰŒâ€Ź25Q0 ! ‍اďť?‏ EED ‍ى‏2 ‍ اďť?‏%)(#‍م اďť?‏/‍أ ŰŒâ€Ź2‍ﺼ‏Xâ€ŤŮˆ‏.‍ ت‏/ ! ‍ ا ŘŞ Ůˆاďť?‏2‍ ŮˆزŰŒâ€Ź/ ‍ع‏/0‍اďť?)آ‏

5%)(#‍ ŘŞ اďť?‏5 ‍) آ‏5‍ ŘŞ &ﺥ‏5 ‍ ا‏5%)(‍ ه‏A5$9 5 #(‍( اďť?‏5$‍ب اďť?‏L5a 5‍ن ‏/5Q‍ ŘŞ ŘŁŮˆ أن ŰŒâ€Ź5 ‍< ا‏5 = 5 5%)(#‍)Ů… ‏590 ‍ن اďť?‏/Q‍ أن ŰŒâ€ŹU â€ŤŰŒâ€Ź ‍ن‏/5Q‍ زŮˆان ŰŒâ€Ź9 5$‍؍ اďť?‏Lb5‍ات اďť?‏/(5$‍ل اďť?‏L5‍ى ﺼ‏25‍ ŘŠ اﺼ‏5 ‍ اŮˆâ€Ź5 5 ‍ دع‏c5 ‍ل‏/5 ‍ ďť?‏5 ‍)م‏90‍ اďť?‏8F$‍ ŰŒâ€ŹA‍ )ŰŒ) Ůˆďť?‏F‍اďť?‏. â€ŤŰŒâ€Ź2 ‍ ďť? ! ŘŞ اďť?‏ . #( ! ‍ ŘŞ اďť?‏/‍ﺽ‏/ ‍( ŮˆŮ„ اﺥ) اďť?‏0 ‍ اﺚ Ůˆâ€ŹF‍اďť?‏

( Securing Wireless Communication Networks)

Q %L‍ ŘŞ ا ŘŞ اďť?‏QFe ‍ &‏-1

Businesses, individuals and public administrations still underestimate the risks of insufficiently protecting networks and information. However, as enterprises increasingly are using wireless devices to create and transmit new data and to access the most sensitive information sitting on their corporate servers, the risks are much greater, the stakes are much higher, and potential loss is much more catastrophic. A good research in this are could address on the following topics: 1- Cellular Mobile Security 2- Wireless LAN Security 3 – Bluetooth Security : ‍ـ ŘŞ ŮˆŘą ا‏ • • •

Identification of security threats and their risks Security techniques used in each type of network (e.g. : A3, A5, A8, IEEE802.1x (EAP), WEP, IEEE802.11i, WPA, ‌ , etc) Current status of wireless network vulnerability.

( Convergence of Communication Networks) ‍ ŘŞ ا ت‏QFe ‍ عب‏90‍ اďť?‏-2

In today's society one can communicate with a friend via mail, online chatting, fixed telephone, mobile phones and many other forms of modern technology. Though the forms of technology are all very different, they all essentially provide the same basic service: person-to-person communication. The


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
جائزة البحث العلمى فى مجال الاتصالات2009 by الجمعية العلمية لمهندسى الاتصالات - Issuu