ENHANCING MESSAGE PRIVACY IN WEP by DARSHAN

نویسندگان

  • SHRINATH PURANDARE
  • Darshan Purandare
  • Mostafa Bassiouni
  • Abhishek Srivastava
چکیده

The 802.11 standard defines the Wired Equivalent Privacy (WEP) and encapsulation of data frames. It is intended to provide data privacy to the level of a wired network. WEP suffered threat of attacks from hackers owing to certain security shortcomings in the WEP protocol. Lately, many new protocols like WiFi Protected Access (WPA), WPA2, Robust Secure Network (RSN) and 802.11i have come into being, yet their implementation is fairly limited. Despite its shortcomings one cannot undermine the importance of WEP as it still remains the most widely used system and we chose to address certain security issues and propose some modifications to make it more secure. In this thesis we have proposed a modification to the existing WEP protocol to make it more secure. We achieve Message Privacy by ensuring that the encryption is not breached. The idea is to update the shared secret key frequently based on factors like network traffic and number of transmitted frames. We also develop an Initialization Vector (IV) avoidance algorithm that eliminates IV collision problem. The idea is to partition the IV bits among different wireless hosts in a predetermined manner unique to every node. We can use all possible 2 different IVs without making them predictable for an attacker. Our proposed algorithm eliminates the IV collision ensuring Message Privacy that further strengthens security of the existing WEP. We show that frequent rekeying thwarts all kinds of cryptanalytic attacks on the WEP.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhancing Message Privacy in WEP

The Wired Equivalent Privacy (WEP) protocol for networks based on 802.11 standards has been shown to have several security flaws. In this paper we have proposed a modification to the existing WEP protocol to make it more secure. We also develop an IV avoidance algorithm that eliminates Initialization Vector (IV) collision problem by assigning unique pattern of IV bits to each node. We achieve M...

متن کامل

WEP Security Analysis and Enhancement Techniques

Wired Equivalent Privacy (WEP) is an IEEE 802.11 standard implemented to provide security to data transmitted on wireless networks. In this paper we enhance the WEP security by improving the authenticity, integrity and confidentiality mechanisms. WEP uses static 40 bit as pre-shared secret key for pseudo noise sequence generation. Our method uses dynamic key which keeps changing time to time de...

متن کامل

Enhanced Wired Equivalent Privacy for IEEE 802.11 Wireless LANs

The Wired Equivalent Privacy (WEP) is defined as part of the IEEE 802.11 standard to provide secure communication over a wireless channel. However, it suffers serious security flaws, such as the vulnerability of RC4 to keystream reuse and the misuse of CRC checksum in ensuring data integrity. In this paper, we design, implement, and evaluate a software (middleware) approach, which runs on top o...

متن کامل

A Survey of Wireless Network Security Protocols

Today, the majority of wireless networks hold some form of sensitive data that only authorized users are meant to access. As a result, communication networks must enforce some type of security protocols that will limit the users who have access to the network resources. To ensure that a network is secure, the network must be able to enforce two key concepts: data privacy and data integrity. Dat...

متن کامل

Security Analysis of Michael: the IEEE 802.11i Message Integrity Code

The IEEE 802.11b standard employs a data security mechanism known as Wired Equivalent Privacy (WEP). WEP uses RC4 stream cipher for its data encryption and CRC-32 to check its message integrity. Recent research shows that WEP is not secure as it does not use RC4 and CRC-32 correctly. The latest IEEE 802.11i draft uses a new keyed hash function, called Michael, as the message integrity code. Thi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005