Performance Evaluation of WEP with CRC32 and MD5 using NS2 Simulator
Abstract
The wireless LANs (WLANs) have become more
prevalent and are widely deployed in many places such as corporate office Conference rooms, industrial warehouses, campus, residences, cafe etc. The IEEE 802.11-based WLAN presents new challenges for network administrators and information security administrators. The security of a WLAN is very important, especially for applications hosting valuable information.. This work critically reviews main security flaws of WEP, including short IV, key reuse, poor key management and suggests a new approach of automatic key management and refreshing of WEP key so that attacker could not
have sufficient time to guess the key . By replacing the CRC32 With the MD5 Hash Function to enhance the Security of WLAN's and data integrity. In this current work we are implementing the MD5 Hash technique in the WEP and securing the data from the dictionary attack.
Keywords
Full Text:
PDFReferences
Zhang lonjun, Zon Tao, An improved Key Management scheme for
WEP, 978-0- 7695-3492, March 2008.
S. Chandramathi, K.V. Arun Kumar, Pond cherry Engineering college,
India, Fuzzy based dynamic WEP Key management scheme for WLAN
security enhancement.
IEEE.Wireless LAN Medium Access Control (MAC) and Physical
Layer (PHY) Specifications. IEEE Standard 802.11, 1999.
Matthew S. Gast. 802.11 Wireless Networks: The Definitive Guide.
O’Reilly & As- sociates, Inc., Sebastopol, CA, USA, 2002. ISBN
IEEE. Amendment 6: Medium Access Control (MAC) Security
Enhancements. IEEE Standard 802.11i, 2004.
IEEE. Standard for Local and Metropolitan networks — Port-Based
Network Access Control. IEEE Standard 802.1X, 2001.
RFC2865. Remote Authentication Dial In User Service (RADIUS), june
Edney and William A. Arbaugh. Real 802.11 Security: Wi-Fi Protected
Access and 802.11i. Addison-Wesley Longman Publishing Co., Inc.,
Boston, MA, USA, 2003. ISBN 0321136209.
Aaron E. Earle. Wireless Security Handbook. AUERBACH, 2005. ISBN
J. Stenman, J. Salvela, and H. Hansen. Eu patent 1178644: Key
management methods for wireless lans, 2002.
WEPCrack. WEPCrack Project Homepage. Retrieved Sep 25, 2005,
from http://sourceforge.net/projects/wepcrack.
Peter Gutmann. Software Generation of Practically Strong Random
Numbers. January 1998.
Wi-Fi Alliance. Wi-Fi Alliance WPA Specification, 2002.
Takehiro Takahashi. WPA Passive Dictionary Attack Overview, 2004.
CoWPAtty. CoWPAtty Project Homepage. Retrieved Oct 17, 2005,
from http: //sourceforge.net/projects/cow patty.
Bruce Schneier. Applied cryptography: protocols, algorithms, and
source code in C. Wiley, New York, 2nd edition, 1996. ISBN 0–471–
–7.
NIST.Recommendation for key management. part 1: General. Technical
report, NIST(National Institute of Standards and Technology), 2005.
Donald E. Knuth. The art of computer programming, volume 2 (3rd ed.):
seminumerical algorithms. Addison-Wesley Longman Publishing Co.,
Inc., Boston, MA,USA, 1997. ISBN 0-201-89684-2.
S. K. Park and K. W. Miller. Random number generators: good ones are
hard to find.Commun. ACM, 31(10):1192–1201, 1988. ISSN 0001-
ISO and IEC. Information processing systems security techniques. entity
authen- tication. International Standard ISO/IEC 9798, 1991.
NIST. Fips 140-2: Security requirements for cryptographic modules.
Technical report, NIST(National Institute of Standards and Technology),
May 2001.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.