The proactive intrusion prevention for Wireless Local Area Network

IEEE 802.11b utilises WEP for data encryption to strengthen wireless security. However, WEP is proven to be insecure and its secret key can be cracked within only a short period of time. This research, in consideration of increasing need in WLAN security enhancements, attempts to devise a solution to prevent adversaries by developing a Wireless Intrusion Prevention System (WIPS) to detect and prevent War-driving and WEP attacks. An implementation of the WIPS is described in this paper as an illustration of the feasibility of the proposed architecture and results are presented.

[1]  Alessandro Neri,et al.  Integrated security architecture for WLAN , 2003, 10th International Conference on Telecommunications, 2003. ICT 2003..

[2]  Woei-Jiunn Tsaur,et al.  A mobile agent protected scheme using pairing-based cryptosystems , 2005, Int. J. Mob. Commun..

[3]  H. Joseph Wen,et al.  An efficient wireless transmission method for m-commerce , 2004, Int. J. Mob. Commun..

[4]  Qilian Liang,et al.  Secure media access control (MAC) in wireless sensor networks: intrusion detections and countermeasures , 2004, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754).

[5]  David A. Wagner,et al.  Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.

[6]  Chang Liu,et al.  Wireless trust: conceptual and operational definition , 2004, Int. J. Mob. Commun..

[7]  S. Upadhyaya,et al.  SWAN: a secure wireless LAN architecture , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[8]  Ali Bakirdan,et al.  Security algorithms in wireless LAN: proprietary or nonproprietary , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[9]  Scott D. Lathrop,et al.  Wireless security threat taxonomy , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..

[10]  Golden G. Richard,et al.  Physically Locating Wireless Intruders , 2004, ITCC.

[11]  Greg Goth NEWS: Will the White House Take on Wi-Fi? , 2003, IEEE Distributed Syst. Online.

[12]  Wang Yue,et al.  WLAN and it's security problems , 2003, Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies.

[13]  John Ioannidis,et al.  A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP) , 2004, TSEC.

[14]  Henry L. Owen,et al.  Wireless intrusion detection and response: a classic study using main-in-the-middle attack , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[15]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[16]  Jizhou Sun,et al.  Intrusion detection solution to WLANs , 2004, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710).

[17]  Ari J. Maunuksela,et al.  Micromobility supported WLAN networks: an empirical study of new IP protocol to support mobility and connection handovers , 2005, Int. J. Mob. Commun..

[18]  Rob Flickenger Building Wireless Community Community Networks , 2003 .

[19]  Jizhou Sun,et al.  Intrusion detection for wireless local area network , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).

[20]  D. Sampath,et al.  Strengthening WEP protocol for wireless networks using block chaining algorithm with variable encrypting function mechanism , 2004, 2004 IEEE/Sarnoff Symposium on Advances in Wired and Wireless Communications.

[21]  Yong-Hua Song,et al.  OFDM over IEEE 802.11b hardware for telemedical applications , 2004, Int. J. Mob. Commun..

[22]  Chang Liu,et al.  Conceptual and operational definition of system complexity in the domain of Wireless Internet via Mobile Technology , 2003, Int. J. Mob. Commun..

[23]  Henry L. Owen,et al.  Wireless intrusion detection and response , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..

[24]  A. Celik,et al.  Improving the security of wireless LANs by managing 802.1x disassociation , 2004, First IEEE Consumer Communications and Networking Conference, 2004. CCNC 2004..

[25]  Bruce Potter,et al.  Wireless Security's Future , 2003, IEEE Secur. Priv..

[26]  Upkar Varshney,et al.  Wireless in the enterprise: requirements, solutions and research directions , 2004, Int. J. Mob. Commun..