A Survey of Wireless Security

Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication, confidentiality and integrity. The paper, also, gives a summary of security improvements of WEP protocol that can lead to the higher level of wireless network infrastructure protection. Comparative analysis shows the advantages of the new 802.11i standard in comparison to the previous security solutions.

[1]  Jesse Walker,et al.  Unsafe at any key size; An analysis of the WEP encapsulation , 2000 .

[2]  John C. Mitchell,et al.  Security Analysis and Improvements for IEEE 802.11i , 2005, NDSS.

[3]  Scott D. Lathrop A Survey of 802.11a Wireless Security Threats and Security Mechanisms , 2003 .

[4]  Jason Smith,et al.  Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks , 2006, ACSW.

[5]  Dejan Simic,et al.  Holistic approach to Wep protocol in securing wireless network infrastructure , 2006, Comput. Sci. Inf. Syst..

[7]  Jyh-Cheng Chen,et al.  Wireless LAN security and IEEE 802.11i , 2005, IEEE Wireless Communications.

[8]  Kefei Chen,et al.  Some remarks on the TKIP key mixing function of IEEE 802.11i , 2006, IACR Cryptol. ePrint Arch..

[9]  Ivan Martinovic,et al.  Phishing in the Wireless: Implementation and Analysis , 2007, SEC.

[10]  Jason Smith,et al.  Specification-Based Intrusion Detection in WLANs , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[11]  Lei Han,et al.  A Threat Analysis of The Extensible Authentication Protocol , 2006 .

[12]  David A. Wagner,et al.  Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.

[13]  Floriano De Rango,et al.  Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i , 2006, EURASIP J. Wirel. Commun. Netw..

[14]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[15]  Russ Housley,et al.  Counter with CBC-MAC (CCM) , 2003, RFC.

[16]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[17]  A T Karygiannis,et al.  Wireless Network Security: 802.11, Bluetooth and Handheld Devices , 2002 .

[18]  M. Looi,et al.  A trivial denial of service attack on IEEE 802.11 direct sequence spread spectrum wireless LANs , 2004, 2004 Symposium on Wireless Telecommunications.