WEP and WPA Improvement

Document Sample
WEP and WPA Improvement Powered By Docstoc
					Wireless Sensor Network, 2010, 2, 239-242
doi:10.4236/wsn.2010.23032 Published Online March 2010 (http://www.scirp.org/journal/wsn)



                               WEP and WPA Improvement
                                  Mustafa ElGili, Samani A. Talab, Awad H. Ali
                   Department of Information Technology, University of Neelain, Khartoum, Sudan
                                           E-mail: mustgili@hotmail.com
                  Received September 24, 2009; revised October 21, 2009; accepted October 25, 2009

Abstract

This paper aims to describe a solution to improve wireless network security protocols WEP and WPA based
on a modified RC4 algorithm for encryption, and based on initialization vector (IV) with secret key for a
session key exchange, and new mutual authentication mechanism.

Keywords: Wireless, Security, Authentication, WEP, WPA, RC4

1. Introduction                                                     Reply Attack.
                                                                    Reference [11] proposes new scheme which modifies
Wireless communications offer organizations and users            the process of WEP Key generation on TKIP. Comparing
many benefits such as portability and flexibility, in-           with TKIP, the proposed protocol neither changes nor
creased productivity, and lower installation costs. How-         increases hardware cost. Moreover, it narrows down
ever, risks are inherent in any wireless technology. The         hardware computing quantities. Further, SEWTP reduces
loss of confidentiality and integrity and the threat of de-      authentication frequency. It also provides security func-
nial of service attacks are risks typically associated with      tion as well as TKIP and does not affect the performance
wireless communications. WEP and WPA are designed                of throughput. But it has limitations represented as:
to protect, but they still have weaknesses discussed in             1) Over flooding, any client will send random number.
[1–8].                                                           New secret key has been generated before authentication
                                                                 process that leads to AP overload, because every client
2. Related Work                                                  joining the AP domain will take a time to generate his
                                                                 secret key.
                                                                    2) The clear IV still there.
Many solutions have been proposed for the remedy of
                           
				
DOCUMENT INFO
Description: Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. However, risks are inherent in any wireless technology. The loss of confidentiality and integrity and the threat of denial of service attacks are risks typically associated with wireless communications. Here, ElGili et al investigate a solution to improve wireless network security protocols WEP and WPA based on a modified RC4 algorithm for encryption, and based on initialization vector with secret key for a session key exchange, and new mutual authentication mechanism.
BUY THIS DOCUMENT NOW PRICE: $6.95 100% MONEY BACK GUARANTEED
PARTNER ProQuest LLC
ProQuest creates specialized information resources and technologies that propel successful research, discovery, and lifelong learning.