Burglarproof WEP Protocol on Wireless Infrastructure
نویسندگان
چکیده
With the popularization of wireless network, security issue is more and more important. When IEEE 802.11i draft proposed TKIP, it is expected to improve WEP (Wired Equivalent Privacy) on both active and passive attack methods. Especially in generating and management of secret keys, TKIP uses more deliberative attitude to distribute keys. Besides, it just upgrades software to accomplish these functions without changing hardware equipments. However, implementing TKIP on the exiting equipment, the transmission performance is decreased dramatically. This article presents a new scheme, Burglarproof WEP Protocol (BWP), that encrypt WEP key twice to improve the security drawbacks of original WEP, and have better performance on transmission. The proposed method is focus on modifying encryption sets to improve the low performance of TKIP, and provides better transmission rate without losing security anticipations base on current hardware configuration.
منابع مشابه
Holistic approach to Wep protocol in securing wireless network infrastructure
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication, confidentiality and integrity. T...
متن کاملA Survey of Wireless Security
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication, confidentiality and integrity. T...
متن کاملWireless Security: WPA Vs WAPI, should we be worried?
The IEEE 802.11 standard includes an optional encryption capability, the Wired Equivalent Privacy (WEP) however, WEP is vulnerable to attack and can easily be broken, therefore WEP was recently temporarily supplemented with Wi-Fi Protected Access (WPA) which offers improvements over WEP while a newer, more secure protocol 802.11i is developed. However, China has now introduced a new security pr...
متن کاملA survey on the wi-fi wireless network systems penetration approaches
Wireless network technology made it possible to communicate easily using the electromagnetic waves leading to removing the biggest barrier in portable communications. As these networks use the air as the communication medium which leads to face with more vulnerabilities. Wireless networks play a vital role in our life in a way that all devices ranging from local modems to organizational equipme...
متن کاملImproved key management scheme for IEEE 802.11
The security of general wireless network protocols is based on a wired equivalent privacy (WEP) protocol. Many researches point out that WEP involved a lot of security weaknesses. The wireless network based on WEP is not secure at all. This paper proposes a new key management scheme (named improved WEP*) that is compatible to IEEE 802.11 standard. The scheme not only improves confidentiality, b...
متن کامل