Strengthening the Encryption Mechanism in WEP Protocol (original) (raw)

Securing Wireless Networks with Enhanced WEP

2006

Wireless is the next generation networking technology. The security of such technology is very critical because its physical layer is the electro-magnetic waves that can be easily intercepted by anyone. The original security protocol for 802.11 wireless networks is called WEP (Wired Equivalent Privacy), it is a protocol that is based on symmetric-key encryption algorithm RC4 (Rivest Cipher 4). Unfortunately this protocol had many flaws that made it exposed to many attacks. This paper presents a set of improvements for WEP: these improvements convert WEP to a hybrid cryptosystem, a system that is based on both a symmetric-key algorithm and an asymmetric-key algorithm.

A hybrid cryptosystem based on WEP for 802.11 networks

Journal of Computational Methods in Sciences and Engineering

Wireless is the next generation networking technology. The security of such technology is very critical because its physical layer is the electro-magnetic waves that can be easily intercepted by anyone. The original security protocol for 802.11 wireless networks is called WEP (Wired Equivalent Privacy). It is a protocol that is based on symmetric-key encryption algorithm RC4 (Rivest Cipher 4). Unfortunately, this protocol had many flaws that made it exposed to many attacks. This paper presents a set of improvements for WEP, which include key management and distribution, and authentication. These improvements convert WEP to a hybrid cryptosystem, a system that is based on both a symmetric-key algorithm and an asymmetric-key algorithm.

Review on Cryptographic WLAN protocols and their weakness

Cryptography is used for secure communication. It is a practice or study of techniques for secure communication without interpretation of third party. Modern cryptography use mathematical theory and computer science techniques to implement cryptography algorithms. We implement these algorithms for secure systems. In the digital era we share our confidential information over the internet that is not so secure because of third party in between sender and receiver so to achieve high confidentiality and integrity we use cryptography techniques to make the communication more secure over the internet. In this paper we discuss these cryptographic technique implementations and their weakness. We will describe some real example of cryptography where security implementation fails and give birth to cryptography flaws and unsecure communication.

WLAN Security and Efficiency Issues based on Encryption Techniques

The first wireless protocol WEP has not been up to the mark as proved by several attacks. The second wireless security protocol WPA is better than WEP in terms of security, throughput and memory utilization. Still it has major weaknesses in terms of security and the protection of integrity of transmitted data. The latest standard WPA2 has shown the best immunity towards these attacks. Hackers are finding newer ways to expose its vulnerability. In order to provide secure service WPA2 has to keep on adapting with this new attacks.in doing so it should not compromise its efficiency. In this paper we reviewed WPA2, so me encryption algorithms, their benefits, vulnerabilities and reviewed research papers that tried to modify the encryption algorithms to make the process more secure and efficient.Finally we conclude that many algorithms, mechanisms and standards are developed to secure the WLAN s. But in one or other way they failed to provide security and efficiency altogether.

RC4 stream cipher and possible attacks on WEP

In this paper we analyze and present some weaknesses and possible attacks on the RC4 stream cipher which were published in many journals. We review some advantages and disadvantages which come from several authors, as well as similarities and differences which can be observed in the published results. Also, we analyze the Key Scheduling Algorithm (KSA) which derives the initial state from a variable size key, and strengths and weaknesses of the RCS stream cipher. Using examples from other papers, we show that RC4 is completely insecure in a common mode of operation which is used in the widely deployed Wired Equivalent Privacy protocol (WEP, which is part of the 802.11 standard).

Review of Wireless Security Protocols WEP WPA WPA220200419 114912 1v3j4tv

Lahore Lead university, 2020

Wireless technology has been increasingly popular for some year. Acceptance of wireless network depend on the case of use and level of security. Now day the most of wireless network hold over sensitive information and given access only authorized user. As a result communication network are essential implements some type of security protocol that will restrict users to who have access to network resource. To make sure the network is most secure. Must be network capable implements two concepts data privacy and data integrity. Data privacy is ensuring this when it comes to data integrity all the pocket on network are irreversible or unreadable for any universal force to sure that edited data is corrected. There are three main type of security standard in wireless. In this survey paper we discusses three most well know wireless network protocols also name WEP, WPA and WPA2. We discussed the shape of WEP and WPA, WPA2. Now we try to explain WPA2 version and problem after this to solve the major problem. At the end we make comparison among WEP and WPA and WPA2 as all wireless security protocols in Wi-Fi technology.

Performance Improvement of IEEE 802.16/Wimax Using Elliptic Curve Cryptography

ijcsit.com

The IEEE Standard 802.16 (WiMax) promises to provide wireless broadband access to homes, businesses and core telecommunication networks worldwide. However, security is a key concern to the success of IEEE Standard 802.16. Wireless networking is not as secure as other networking technologies. But IEEE 802.16 provides much higher security as compared to other wireless technologies, such as IEEE 802.11 (Wi-fi). IEEE 802.16 provides several security mechanisms, which provides more security by protecting the network against unauthorized access. Many paper provides the security improvement mechanism for WiMax. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still exposes to various attacks. This paper provides a mechanism for increasing the efficiency & hence improves the existing model.

A survey on wireless security protocols (WEP, WPA and WPA2/802.11i)

Computer Science and …, 2009

Wireless technology has been gaining rapid popularity for some years. Adaptation of a standard depends on the ease of use and level of security it provides. In this case, contrast between wireless usage and security standards show that the security is not keeping up with the growth paste of end user's usage. Current wireless technologies in use allow hackers to monitor and even change the integrity of transmitted data. Lack of rigid security standards has caused companies to invest millions on securing their wireless networks. There are three major types of security standards in wireless. In our previous papers which registered in ICFCC 2009 Malaysia and ICCDA 2009 Singapore [1] [2], we explained the structure of WEP and WPA as first and second wireless security protocols and discussed all their versions, problems and improvements. Now, we try to explain WPA2 versions, problems and enhancements that have done solve the WPA major weakness. Finally we make a comparison among WEP and WPA and WPA2 as all wireless security protocols in Wi-Fi technology. In the next phase we hope that we will publish a complete comparison among wireless security techniques by add the WiMax security technique and make a whole comparison among all security protocols in this area.

Comparative Analysis of Security and Privacy Protocols in Wireless Communication

The rapid growth of popularity in wireless technologies has led to the source of inventions for more and more resilient protocols that thwart security and privacy threats. Wi-Fi protocols have gained immense interest in present wireless technology because of their flexibility, convenience, and cost-effectiveness. Apart from these features, the protocols have to emphasize also on privacy and security for securing communications over the wireless medium. This paper highlights the various Wi-Fi protocols, from the very basic WEP to widely implemented WPA2 and the next robust WPA3. The paper also concentrates on the vulnerabilities and strengths of each protocol. Each algorithm's key generation mechanisms are unique and improved in each next technology to eradicate the previous vulnerability. The AES algorithm mitigates the susceptible nature of the RC4 algorithm in WEP and WPA in WPA2. The latest technology is WPA3, which provides a vast second defense line for networks with weak passwords rather than focusing only on encryption strength.

WEP and WPA Improvement

This paper aims to describe a solution to improve wireless network security protocols WEP and WPA based on a modified RC4 algorithm for encryption, and based on initialization vector (IV) with secret key for a session key exchange, and new mutual authentication mechanism.