WEP Security Analysis and Enhancement Techniques
نویسنده
چکیده
Wired Equivalent Privacy (WEP) is an IEEE 802.11 standard implemented to provide security to data transmitted on wireless networks. In this paper we enhance the WEP security by improving the authenticity, integrity and confidentiality mechanisms. WEP uses static 40 bit as pre-shared secret key for pseudo noise sequence generation. Our method uses dynamic key which keeps changing time to time depending upon the traffic rate on the network. This approach results into more random pseudo noise sequence. A large number of different encryption keys are generated using this approach. The integrity check value of data generated using cyclic redundancy check polynomial has been modified by using message authentication code. This message authentication code technique allows access to authorized clients.
منابع مشابه
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse of the same key stream by different frames is a weakness in the WEP. One enhancement to WEP is the Temporal Key Integrity Protocol (TKIP), which acts as a wrapper to the WEP protocol and uses a 128 bit RC4 encryption ...
متن کاملSecurity Enhancement of WEP Protocol IEEE 802 . 11 b with Dynamic Key Management
Wireless network security has become a strong requirement for effective deployment of wireless communication applications. There are obviously some reasons for users who like to use wireless technology because of its various benefits. However, as the attacks against WLANs are easier than LAN, the security architectures in WLANs have been discussed frequently. In this paper, the vulnerabilities ...
متن کاملWireless Security Design Overview
Today, Wireless Network has become more and more present in open area or large companies and security enhancement is needed to control authentication and confidentiality. The 802.11 Working Group introduced the 802.11i amendment as the final stage of the Robust Security Network standard, superseded the old WEP technology. This paper describes the technical evolution of wireless security and int...
متن کاملPerformance Related Security Modelling and Evaluation of RANETs
An exposition is undertaken on the performance related security modelling and evaluation of a robotic mobile wireless ad hoc networks (RANETs) and associated tradeoffs. It is based on the discrete event simulation analysis of a stable open gated queueing network model with infinite capacity, arbitrary configuration and multiple classes of packets under first-come-first-served and head-of-line r...
متن کاملAnalysis of WEP Performance on Mobile Devices
Mobile devices are becoming more popular every day; they must keep up with security implemented by desktop computers. This paper tries to evaluate performance of data transmission with and without ciphering techniques. WEP is not the best way of securing a network but it is widely used, that is why we used WEP on these tests. This article tries to define how much performance is lost with WEP, s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013