Explore chapters and articles related to this topic
Privacy Preservation with Machine Learning
Published in Sudhir Kumar Sharma, Bharat Bhushan, Narayan C. Debnath, IoT Security Paradigms and Applications, 2020
P. Bhuvaneswari, Nagender Kumar Suryadevara
The main weakness of WEP is its use of static encryption keys. An eavesdropper can collect a large enough sample of your transmission stream to derive the WEP encryption key, which allows them to decrypt everything being transmitted by you. WPA is more secure than WEP, and it uses an enhanced encryption protocol called TKIP (Temporal Key Integrity Protocol). WPA key generation includes the shared key and network’s name (or SSID) for each client. Keys are refreshed to secure from the WEP attackers. WPA2 [20] is a much better version of Wi-Fi secure protocol than WPA for the stronger security against attacks. WPA2 has stronger encryption and authentication mechanisms, AES and counter mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP). WPA2 maintains TKIP for backward compatibility.
Authentication in Wireless Networks
Published in Yang Xiao, Security in Distributed, Grid, Mobile, and Pervasive Computing, 2007
Saikat Chakrabarti, Venkata C. Giruka, Mukesh Singhal
The Wired Equivalent Privacy (WEP) protocol is used by the IEEE 802.11 standard to provide confidentiality for network traffic in a wireless local area network (WLAN). WEP aims to protect link-level data during wireless transmissions. In WEP, all clients of the wireless network share a secret key, called the WEP key, which is used by the client for authentication and for encryption/ decryption of messages. This means the client uses the same key to do the following: (1) encrypt the challenge sent by the AS and create the response for authenticating itself to the AS and (2) encrypt messages. An obvious drawback of this protocol stems out of the fact that the WEP key is shared by the clients. The sharing of the WEP key becomes a bottleneck when the key needs to be updated because the updating requires changing the key that is stored in the clients’ (wireless mobile devices). Several security flaws have been exposed in the WEP protocol [3,15,28] and new security solutions have been proposed by several researchers and vendors. To address the security weaknesses of WEP, the WiFi alliance (the international association of wireless device manufacturers) proposed a new standard for the WLAN security, called WiFi Protected Access (WPA). An IEEE 802.11i draft has also been finalized by IEEE and is known as Robust Security Network (RSN) or WPA2, which is designed to overcome the security flaws of WEP [7].
Wireless Local Area Networks
Published in Stephan S. Jones, Ronald J. Kovac, Frank M. Groom, Introduction to COMMUNICATIONS TECHNOLOGIES, 2015
Stephan S. Jones, Ronald J. Kovac, Frank M. Groom
Although WEP sounds secure, most information technology (IT) professionals warn that it should not be the only means of wireless security. WEP uses a 128-bit key for encryption, and this has been shown to be vulnerable. The IEEE task group is currently working on providing more security to WEP for incorporation with future releases of the standard. The proposed new version will include different privacy algorithms and provisions for enhanced authentication.
Policy-based security for distributed manufacturing execution systems
Published in International Journal of Computer Integrated Manufacturing, 2018
Octavian Morariu, Cristina Morariu, Theodor Borangiu
Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping but it is not considered secure as explained in Boland and Mousavi (2004) and Reddy et al. (2010). Tools such as AirSnort or Aircrack-ng can quickly determine WEP encryption keys. As a response to security concerns of WEP, Wi-Fi Protected Access (WPA) was introduced. Even if WEP is more secured then WPA, it still has known vulnerabilities. WPA2 is using Advanced Encryption Standard and eliminates some of the vulnerabilities of WEP. However, Wi-Fi Protected Setup which allows initial configuration of the Wi-Fi connection cannot prevent WPA and WPA2 security to be broken in several scenarios. Once the network layer is breached, an attacker will have direct access to the higher layer protocols allowing unauthorised access to information, theft of proprietary information, DoS at the protocol layer and impersonation. Berghel and Uecker (2005) and Aime, Calandriello, and Lioy (2007) point out these security concerns. The higher layer protocols can be secured using secure sockets layer (SSL) that provides encryption, authentication and authorisation of the actors involved using a PKI for certificate management. IEEE 802.11i is a more recent Wi-Fi standard that offers improved security mechanisms like Key Derivation Mechanism, AES, CBC-MAC or AES in CTB. A more recent standard proposition IEEE 802.11ai promises a fast initial link set-up function. This would allow a wireless LAN client to achieve a secure link within 100 ms. At this point, there are no commercial implementation available.