Open Access Open Access  Restricted Access Subscription or Fee Access

New Wireless Network Protocol: WEP, WAP, WAP2

Abhishek Badholia, Vijayant Verma, Sanjay Kalkal, Sunil Kumar Kashyap

Abstract


The modern communication lies with the Wireless Network Systems (WNS). This paper studies the three popular WNS protocols, i.e., WEP, WAP and WAP2. The improved version of WEP, WAP and WAP2 is presented in this paper. The proposed algorithm performs better than the existed. The new WEP, WAP and WAP2 are based on the algebraic, statistics and logarithmic methods. Thus, the improved WEP, WAP and WAP2 perform better as per the standards of security and efficiency.

Keywords: WNS, WEP, WAP, WAP2.

Full Text:

PDF

References


Jason Bonde, Wireless Security, University of Minnesota UMM CSci Senior Seminar Conference Morris, MN.

National Institute of Standards and Technology NIST 800-97, Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i, http://csrc.nist.gov/publications/nistpubs/800-97/SP800-97.pdf

Arash Habibi Lashkari, Masood Mansoori, Amir Seyed Danesh. Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA)‖, in ICCDA Singapore Conference, 2009

Paul Arana. Benefits and Vulnerabilities of Wi-Fi Protected Access 2 (WPA2) ‖, INFS 612-Fall 2006

J. C. M. Changhua He. Security Analysis and Improvements for IEEE 802.11i, ‖ in 12th Annual Network and Distributed System Security Symposium, 2005

A.K.M. Nazmus Sakib, Fariha Tasmin Jaigirdar, Muntasim Munim, Armin Akter. Security Improvement of WPA 2 (Wi-Fi Protected Access 2) ‖, International Journal of Engineering Science and Technology (IJEST), Vol. 3 No. 1 Jan 2011

Frank H. Katz. WPA vs. WPA2: Is WPA2 Really an Improvement on WPA? ‖ in 2010 4th Annual Computer Security Conference (CSC 2010), April 15-16, 2010, Coastal Carolina University, Myrtle Beach, SC.

Martin Beck, Erik Tews. Practical attacks against WEP and WPA‖, in WiSec '09: Proceedings of the second ACM conference on Wireless network security, New York, USA, ACM (2009)

Alexander Gutjahr, Albert Ludwigs University, Freiburg. ―Wired Equivalent Privacy (WEP) Functionality, Weak Points, Attacks‖

Shadi R. Masadeh, Nidal Turab. A Formal Evaluation of the Security Schemes for Wireless Networks‖, Research Journal of Applied Sciences, Engineering and Technology 3(9): 910-913, 2011

Se Hyun Park, Aura Ganz, Zvi Ganz. Security protocol for IEEE 802.11 wireless local area network‖, Mobile Networks and Applications. Vol. 3. 1998

Halil Ibrahim Bulbul, Ihsan Batmaz, Mesut Ozel. Wireless Network Security: Comparison of WEP (Wired Equivalent Privacy) Mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) Security Protocols‖; in Proceedings of the 1st international conference on Forensic applications and techniques, information, and multimedia and workshop, (Adelaide, Australia, January 21-23, 2008), ICST, Brussels, Belgium, 2008.

Erik Tews, Ralf-Philipp Weinmann, and Andrei Pyshkin. Breaking 104-bit wep in less than 60 seconds. Cryptology ePrint Archive, Report 2007/120 (2007)

Scott Fluhrer, Itsik Mantin, Adi Shamir. Weaknesses in the Key Scheduling Algorithm of RC4‖, In Eight Annual Workshop on Selected Areas in Cryptography, August 2001.

Nidal Turab, Florica Moldoveanu. A Comparison between Wireless LAN Security Protocols‖, Series C, Vol. 71, No. 1, 2009, ISSN: 1454-234x, Scientific Bulletin of UPB.

Jyh-Cheng Chen, Ming-Chia Jiang, Yi-Wen Liu. Wireless LAN Security and IEEE 802.11i‖, IEEE Wireless Communications, vol. 12, no. 1, pp. 27–36, Feb. 2005

Microsoft Technet Library, How 802.11 Wireless Works, Technical Reference, Available: http://technet.microsoft.com/en-us/library/cc757419(WS.10).aspx

Erik Tews. Attacks on the wep protocol‖, Cryptology ePrint Archive, Report 2007/471, 2007

Marko Ihonen, Anssi Salo, Tuomo Timonen, Laboratory of Communications Software, Lappeenranta University of Technology, 802.11 Security Protocols, Seminar Report

Joon S.Park, Derrick Dicoi, Syracuse University. WLAN Security: Current and Future‖, IEEE Computer Society, October 2003.

Nidal Turab, Shadi Masadeh. Recommendations guide for WLAN Security‖, The International Journal of ACM Jordan, Vol. 1, No. 1, March 2010

Wong Stanley GSEC "The evolution of wireless security in 802.11 networks: WEP, WPA and 7802.11 standards" Practical v1.4b, SANS institute, May 20, 2003

Arunesh Mishra, William, A. Arbaugh. An Initial Security Analysis of The IEEE 802.1X Standard‖, University of Maryland, Department of Computer Science and University of Maryland Institute for Advanced Computer Studies Technical Report CS-T R-4328 and UMIACS-TR-2002-10 6 February 2002

Benjamin Miller, WPA2 Security: Choosing the Right WLAN Authentication Method for Homes and Enterprises, Global Knowledge, 2008

Lehembre, Guillaume. ―Wi-Fi security –WEP, WPA and WPA2‖, Article published in number 1/2006 (14) of hakin9, Jan. 2006. Publication on www.hsc.fr

Songhe Zhao, Shoniregun, C.A., Imafidon, C, "Addressing the vulnerability of the 4-way handshake of 802.11i", in Proceedings of the 3rd ACM workshop on Wireless security, Philadelphia, PA, USA, 2004, pp. 43 - 50.

Arockiam .L. and Vani .B. A Survey of Denial of Service Attacks and its Countermeasures on Wireless Network‖, International Journal on Computer Science and Engineering, Vol.02, No. 05, pp. 1563-1571, 2010.

A. Chiornita, L. Gheorghe, and D. Rosner. A practical analysis of EAP authentication methods. In Roedunet International Conference (RoEduNet), 2010 9th, pages 31 - 35, June 2010.

K. Benton. The evolution of 802.11 wireless security‖, INF 795, April 18th, 2010. UNLV Informatics-Spring 2010

Andrea Bittau, Mark Handley, Joshua Lackey. The final nail in WEP's coffin, IEEE Symposium on Security and Privacy, pages 386-400. IEEE Computer Society, 2006.

C. Rigney, S. Willens, A. Rubens, W. Simpson. Remote Authentication Dial In User Service (RADIUS)‖, RFC 2865, June 2000.

C. He, J. C. Mitchell. Analysis of the 802.11i 4-way handshake‖ in Proceedings of the Third ACM International Workshop on Wireless Security (WiSe’04), 2004.

V. Moen, H. Raddum, K. J. Hole. Weakness in the Temporal Key Hash of WPA‖, ACM SIGMOBILE Mobile Computing and Communications Review, April 2004.




DOI: https://doi.org/10.37591/jscrs.v4i2.925

Refbacks

  • There are currently no refbacks.