Open Access Open Access  Restricted Access Subscription or Fee Access

Analysis of WPA in 802.11 Wireless Networks for Security

R. Dhaya, S. Vimal, Dr.R. Kanthavel

Abstract


Wireless networking has been experiencing an enormous development in recent years and offers to both network operators and users an attractive flexibility and coverage. But wireless networks are more susceptible to attacks than wired networks. Hence it is visible that some form of security is required to prevent outsiders from exploiting in the form of eavesdropping, hampering the data and authentication denial in wireless networks. To overcome these security challenges, in the existing system Wired Equivalent Privacy (WEP) protocol is used to protect from attacks. But there are several serious security flaws in the protocol due to tools that can automate the cracking of WEP keys lead to a number of practical attacks that WEP fails to achieve its security goals. This paper proposes a secured wireless networks suitable for 802.11 standards using Wireless Protected Access (WPA) based on AES-CCMP (Advanced Encryption Standard-Counter Mode with Cipher Block Chaining Protocol). The result shows that the security issues in wireless networks have been solved.

Keywords


Wired Equivalent Privacy (WEP),Wireless Protected Access (WPA),AES-CCMP (Advanced Encryption Standard-Counter Mode with Cipher Block Chaining Protocol).

Full Text:

PDF

References


D.Whiting, R.Housley, and N. Ferguson. “IEEE 802.11-02/001r2: AES Encryption and Authentication Using CTR Mode and CBC-MAC”, International Journal of Network Security, Vol no.3, 2008,pp.1-43.

M.Dworkin, “Recommendation for Block Cipher modes of Operation: the CCM Mode for Authentication and Confidentiality”, International Journal of Computer Science and Network Security, Vol no. 4, 2007,pp.1-27.

Abdul Samiah, Arshad Aziz and Nassar Ikram, “An Efficient Software Implementation of AES-CCM for IEEE 802.11i wireless standard”, IEEE Conference on Computer Software and Applications,2007,pp.689-694.

Levente Buttyan and Laszlo Dora, “WiFi security- WEP and 802.11i”, EURASIP Jthisnal on Wireless Communication and Networking, Vol no.1, 2006, p.1-13.

Guillaume Lehembre, “Wi-Fi security – WEP, WPA, WPA2”, ACM Transactions on Information and System Security, Vol no-2, Sep 2005, p.144-152.

Y.Mitsuyama, M.Kimura, T.Onoye and I.Shirakawa, “Architecture of IEEE 802.11i cipher algorithms for embedded systems”, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol no-1, 2005,pp.757-760.

K.Vu and D.Zier, “FPGA Implementation of AES for CCM mode encryption using Xilinx Spartan-II”,Advanced Cryptography, Springer, 003, pp1-5.

M.Junaid, M.Mufti and M.Umar Ilyas, “Vulnerabilities of IEEE 802.11i Wireless LAN CCMP protocol”, Proceedings of IEEE INFOCOM, 2004,pp.436-443.

N.Sklavos, G.Selimis and O.Koufiopavlov, “FPGA Implementation cost & performance evaluation of IEEE 802.11 protocol encryption security schemes”, Proceedings of ACM MOBICOM, 2003, p.304-309.

M.Razvi Doomun and KMS Soyjjaudah, “Analytical Comparison of Cryptographic Techniques for Constrained Wireless Security”, International Journal of Network Security, 2009,Vol.9,No.1,pp 82-91.

W.A.Araugh, “An Inductive chosen plaintext attack against WEP/WEP2”, IEEE,2003,pp.1-18.

J.Edney, W.Arbaugh, “Real 802.11 Security: WiFi Protected Access and 802.11i”, Addison-Wesley, 2003.

J.Walker “Unsafe at any key size : An analysis of the WEP encapsulation”, IEEE Document 802.11-00/362, 2002,pp 1-45.

N.Shankar, J.Wan, K.Zhang, W.Araugh, “Ythis 802.11 network has no clothes”, Proceedings of the 7th ACM Conference on Mobile Computing and Networking, 2002.

R.Juneman, S.Matyas, C.Meyer, “AES Message Authentication”, Journal of Cryptology,2000,Vol.3,Issue 1,pp.45-58.

R.L.Rivest, “The RC4 Algorithm- RSA Data Security”, Internet Engineering Task Force, 2000.

D.Simon, Aboba and T.Moore, ”IEEE 802.11 Security and 802.1X”, IEEE Document 802.11-00/034r1, 2000.pp.1-28.

B.Nikita, G.Ian and W.David, “Security of WEP algorithm”, Proceedings of IEEE ITI 3rd International Conference on Information and Communication Technology (ICICT 2005), 1999.

N.Borisov, I.Goldberg, D.Wagner, “Intercepting mobile communications: the insecurity of 802.11”, ACM, 2001,pp 1-7..


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.