Open Access Open Access  Restricted Access Subscription or Fee Access

Performance Evaluation of WEP with CRC32 and MD5 using NS2 Simulator

Mandeep Kumar

Abstract


The wireless LANs (WLANs) have become more
prevalent and are widely deployed in many places such as corporate office Conference rooms, industrial warehouses, campus, residences, cafe etc. The IEEE 802.11-based WLAN presents new challenges for network administrators and information security administrators. The security of a WLAN is very important, especially for applications hosting valuable information.. This work critically reviews main security flaws of WEP, including short IV, key reuse, poor key management and suggests a new approach of automatic key management and refreshing of WEP key so that attacker could not
have sufficient time to guess the key . By replacing the CRC32 With the MD5 Hash Function to enhance the Security of WLAN's and data integrity. In this current work we are implementing the MD5 Hash technique in the WEP and securing the data from the dictionary attack.


Keywords


WEP, CRC32, MD5, EAPOL, AODV, EED, PDF

Full Text:

PDF

References


Zhang lonjun, Zon Tao, An improved Key Management scheme for

WEP, 978-0- 7695-3492, March 2008.

S. Chandramathi, K.V. Arun Kumar, Pond cherry Engineering college,

India, Fuzzy based dynamic WEP Key management scheme for WLAN

security enhancement.

IEEE.Wireless LAN Medium Access Control (MAC) and Physical

Layer (PHY) Specifications. IEEE Standard 802.11, 1999.

Matthew S. Gast. 802.11 Wireless Networks: The Definitive Guide.

O’Reilly & As- sociates, Inc., Sebastopol, CA, USA, 2002. ISBN

IEEE. Amendment 6: Medium Access Control (MAC) Security

Enhancements. IEEE Standard 802.11i, 2004.

IEEE. Standard for Local and Metropolitan networks — Port-Based

Network Access Control. IEEE Standard 802.1X, 2001.

RFC2865. Remote Authentication Dial In User Service (RADIUS), june

Edney and William A. Arbaugh. Real 802.11 Security: Wi-Fi Protected

Access and 802.11i. Addison-Wesley Longman Publishing Co., Inc.,

Boston, MA, USA, 2003. ISBN 0321136209.

Aaron E. Earle. Wireless Security Handbook. AUERBACH, 2005. ISBN

J. Stenman, J. Salvela, and H. Hansen. Eu patent 1178644: Key

management methods for wireless lans, 2002.

WEPCrack. WEPCrack Project Homepage. Retrieved Sep 25, 2005,

from http://sourceforge.net/projects/wepcrack.

Peter Gutmann. Software Generation of Practically Strong Random

Numbers. January 1998.

Wi-Fi Alliance. Wi-Fi Alliance WPA Specification, 2002.

Takehiro Takahashi. WPA Passive Dictionary Attack Overview, 2004.

CoWPAtty. CoWPAtty Project Homepage. Retrieved Oct 17, 2005,

from http: //sourceforge.net/projects/cow patty.

Bruce Schneier. Applied cryptography: protocols, algorithms, and

source code in C. Wiley, New York, 2nd edition, 1996. ISBN 0–471–

–7.

NIST.Recommendation for key management. part 1: General. Technical

report, NIST(National Institute of Standards and Technology), 2005.

Donald E. Knuth. The art of computer programming, volume 2 (3rd ed.):

seminumerical algorithms. Addison-Wesley Longman Publishing Co.,

Inc., Boston, MA,USA, 1997. ISBN 0-201-89684-2.

S. K. Park and K. W. Miller. Random number generators: good ones are

hard to find.Commun. ACM, 31(10):1192–1201, 1988. ISSN 0001-

ISO and IEC. Information processing systems security techniques. entity

authen- tication. International Standard ISO/IEC 9798, 1991.

NIST. Fips 140-2: Security requirements for cryptographic modules.

Technical report, NIST(National Institute of Standards and Technology),

May 2001.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.