Holistic approach to Wep protocol in securing wireless network infrastructure

نویسندگان

  • Radomir Prodanovic
  • Dejan Simic
چکیده

Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication, confidentiality and integrity. The paper, also, gives a summary of security improvements of WEP protocol that can lead to the higher level of wireless network infrastructure protection. Comparative analysis shows the advantages of the new 802.11i standard in comparison to the previous security solutions. A proposal of possible security improvements of RSNA (Robust Security Network Association) is presented.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A survey on the wi-fi wireless network systems penetration approaches

Wireless network technology made it possible to communicate easily using the electromagnetic waves leading to removing the biggest barrier in portable communications. As these networks use the air as the communication medium which leads to face with more vulnerabilities. Wireless networks play a vital role in our life in a way that all devices ranging from local modems to organizational equipme...

متن کامل

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

A Survey of Wireless Security

Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication, confidentiality and integrity. T...

متن کامل

Multi-dimensional Analyses of 802.11 Wireless Network Security Protocols

Wireless networks have become so ubiquitous that researchers all over the world have come up with various security protocols to ensure confidentiality and integrity of data as well as availability of resources. IEEE 802.11 task group drafted a new wireless security protocol known as robust security network (RSN circa 2009) erstwhile Wi-Fi alliance came up with Wi-Fi Protected Access (WPA). The ...

متن کامل

Wireless Security: WPA Vs WAPI, should we be worried?

The IEEE 802.11 standard includes an optional encryption capability, the Wired Equivalent Privacy (WEP) however, WEP is vulnerable to attack and can easily be broken, therefore WEP was recently temporarily supplemented with Wi-Fi Protected Access (WPA) which offers improvements over WEP while a newer, more secure protocol 802.11i is developed. However, China has now introduced a new security pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Comput. Sci. Inf. Syst.

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2006