WEP Security Analysis and Enhancement Techniques

نویسنده

  • Kamal Garg
چکیده

Wired Equivalent Privacy (WEP) is an IEEE 802.11 standard implemented to provide security to data transmitted on wireless networks. In this paper we enhance the WEP security by improving the authenticity, integrity and confidentiality mechanisms. WEP uses static 40 bit as pre-shared secret key for pseudo noise sequence generation. Our method uses dynamic key which keeps changing time to time depending upon the traffic rate on the network. This approach results into more random pseudo noise sequence. A large number of different encryption keys are generated using this approach. The integrity check value of data generated using cyclic redundancy check polynomial has been modified by using message authentication code. This message authentication code technique allows access to authorized clients.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices

The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse of the same key stream by different frames is a weakness in the WEP. One enhancement to WEP is the Temporal Key Integrity Protocol (TKIP), which acts as a wrapper to the WEP protocol and uses a 128 bit RC4 encryption ...

متن کامل

Security Enhancement of WEP Protocol IEEE 802 . 11 b with Dynamic Key Management

Wireless network security has become a strong requirement for effective deployment of wireless communication applications. There are obviously some reasons for users who like to use wireless technology because of its various benefits. However, as the attacks against WLANs are easier than LAN, the security architectures in WLANs have been discussed frequently. In this paper, the vulnerabilities ...

متن کامل

Wireless Security Design Overview

Today, Wireless Network has become more and more present in open area or large companies and security enhancement is needed to control authentication and confidentiality. The 802.11 Working Group introduced the 802.11i amendment as the final stage of the Robust Security Network standard, superseded the old WEP technology. This paper describes the technical evolution of wireless security and int...

متن کامل

Performance Related Security Modelling and Evaluation of RANETs

An exposition is undertaken on the performance related security modelling and evaluation of a robotic mobile wireless ad hoc networks (RANETs) and associated tradeoffs. It is based on the discrete event simulation analysis of a stable open gated queueing network model with infinite capacity, arbitrary configuration and multiple classes of packets under first-come-first-served and head-of-line r...

متن کامل

Analysis of WEP Performance on Mobile Devices

Mobile devices are becoming more popular every day; they must keep up with security implemented by desktop computers. This paper tries to evaluate performance of data transmission with and without ciphering techniques. WEP is not the best way of securing a network but it is widely used, that is why we used WEP on these tests. This article tries to define how much performance is lost with WEP, s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013