Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols

Wireless Local Area Networks (WLANs) are gaining popularity as they are fast, cost effective, flexible and easy to use. They are, however, faced with some serious security challenges and the choice of security protocol is a critical issue for IT administrators. The goal of this paper is to make the non-specialist reader aware of the disadvantages and threats of the wireless security protocols. WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols are examined in this respect. Then they are compared via the common features in order to give some insight to those who work with WLANs. We hope this paper give boost to the IT security staff and clarify the common questions of the non-specialist reader. This paper is a compilation of the wireless security weaknesses and counter measures that are put forward until recently. We believe that a thorough understanding of this paper makes the non-specialist reader have a complete review of wireless security and vulnerabilities associated with it.

[1]  William A. Arbaugh,et al.  Your 80211 wireless network has no clothes , 2002, IEEE Wirel. Commun..

[2]  John Ioannidis,et al.  Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.

[3]  William A. Arbaugh,et al.  Security issues in IEEE 802.11 wireless local area networks: a survey: Research Articles , 2004 .

[4]  E.J.M. Arruda Filho,et al.  Security versus Bandwidth: The Support of Mechanisms WEP e WPA in 802.11g Network , 2007, 2007 IFIP International Conference on Wireless and Optical Communications Networks.

[5]  William A. Arbaugh,et al.  YOUR 802.11 WIRELESS NETWORK HAS NO CLOTHES , 2001 .

[6]  David A. Wagner,et al.  Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.

[7]  H. Boland,et al.  Security issues of the IEEE 802.11b wireless LAN , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).

[8]  Jesse Walker,et al.  Unsafe at any key size; An analysis of the WEP encapsulation , 2000 .

[9]  Bruce Potter,et al.  Wireless Security's Future , 2003, IEEE Secur. Priv..

[10]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[11]  H. Altunbasak,et al.  Alternative Pair-wise Key Exchange Protocols for Robust Security Networks (IEEE 802.11i) in Wireless LANs , 2004, IEEE SoutheastCon, 2004. Proceedings..

[12]  K. Passerini,et al.  Wireless network security - a discussion from a business perspective , 2005, Symposium, 2005 Wireless Telecommunications.

[13]  J.S. Park,et al.  Wireless security policy development for sensitive organizations , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[14]  William A. Arbaugh,et al.  Security issues in IEEE 802.11 wireless local area networks: a survey , 2004, Wirel. Commun. Mob. Comput..

[15]  Scott D. Lathrop,et al.  Wireless security threat taxonomy , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..