Enhanced Wired Equivalent Privacy for IEEE 802.11 Wireless LANs

نویسندگان

  • Taejoon Park
  • Haining Wang
  • Min-gyu Cho
  • Kang G. Shin
چکیده

The Wired Equivalent Privacy (WEP) is defined as part of the IEEE 802.11 standard to provide secure communication over a wireless channel. However, it suffers serious security flaws, such as the vulnerability of RC4 to keystream reuse and the misuse of CRC checksum in ensuring data integrity. In this paper, we design, implement, and evaluate a software (middleware) approach, which runs on top of WEP, to fill the security holes of WEP. The core of this middleware is a novel key-management protocol in which (1) to minimize the possibility of keystream reuse, the message-keys for data encryption are frequently refreshed; (2) to achieve secure exchange of message-keys, we append the Hash Message Authentication Code (HMAC) to each message-key, and then encrypt it with a base-key1; (3) to provide reliable key-management service, we set up a hidden TCP connection and develop the corresponding daemons at the access point (AP) and a mobile node; and (4) to provide a mobile node with a new base-key and a message-key when the node moves from one microcell2 to another, we realize “secure roaming” based on Inter-Access Point Protocol (IAPP) [2]. Furthermore, to ensure data integrity at the data-link layer, each data frame is augmented with HMAC. By setting the key-refreshment interval judiciously, we can reduce the rate of keystream reuse to an acceptably low level. More importantly, any compromised message-key becomes unusable after a single refreshment interval, and it does not reveal any information about the future message-keys. Our performance evaluation shows that the computation overhead of the proposed scheme is insignificant even when data is transferred at the maximum rate, and it is feasible for an AP to maintain hidden TCP connections for many mobile nodes. Keywords— Wired Equivalent Privacy (WEP), middleware, key management, performance evaluation. 1The base-key is established through Authentication and Key Exchange (AKE) when a mobile node joins the network. 2The microcells are similar to the cells in the cellular telephone system. Each AP controls the microcell.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs

Wired Equivalent Privacy (WEP) protocol was adopted to protect authorised users from unauthorised access and eavesdropping in the IEEE 802.11 wireless LANs. It has been proven that the WEP protocol fails to provide data confidentiality and authentication. This paper first introduces the WEP as well as all kinds of attacks. Then, two approaches to enhance the WEP are proposed to overcome some kn...

متن کامل

Wireless LAN Security Threats & Vulnerabilities

Wireless LANs are everywhere these days from home to large enterprise corporate networks due to the ease of installation, employee convenience, avoiding wiring cost and constant mobility support. However, the greater availability of wireless LANs means increased danger from attacks and increased challenges to an organization, IT staff and IT security professionals. This paper discusses the vari...

متن کامل

Comparison TTLS and PEAP Comparison by Matthew Gast

Broadly speaking, the history of 802.11 security is an attempt to address two major problems. The first problem is that the protocols used to authenticate network users were not strong, so unauthorized users could easily access network resources. Second, the Wired Equivalent Privacy (WEP) system proved insufficient for a number of wellpublicized reasons. Our white paper “What’s Wrong With WEP?”...

متن کامل

On Securing Wireless LANs and Supporting Nomadic Users with Microsoft’s IPSec Implementation

Wireless LANs, like the IEEE 802.11 WLANs, are more vulnerable than their wired counterparts. The IEEE 802.11 specification includes an encryption protocol, WEP (Wired Equivalent Protocol), but this protocol inhibits severe weaknesses: there is no automatic key distribution protocol and WEP’s security itself has been shown to be seriously flawed. As a result, many of today’s IEEE 802.11 network...

متن کامل

Brief Tutorial on IEEE 802.11 Wireless LANs

Final approval of the IEEE 802.11 standard for wireless local area networking (WLAN) last year and rapid progress made toward higher data rates have positioned this technology to fulfill the promise of truly mobile computing. While wired LANs have been a mainstream technology for at least fifteen years, WLANs are uncharted territory for most networking professionals. There are some important di...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003