Random number generators: good ones are hard to find
Communications of the ACM
Verification and validation of simulation models
Proceedings of the 30th conference on Winter simulation
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Security flaws in 802.11 data link protocols
Communications of the ACM - Wireless networking security
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)
ACM Transactions on Information and System Security (TISSEC)
Hi-index | 0.00 |
Many of today's organizations have set up wireless networks for company use, some merely for the convenience of not having wires everywhere. In addition, many of these networks are using a hardware implementation of the IEEE 802.11 Wired Equivalent Privacy protocol (WEP) for security. With the known vulnerabilities in WEP, these organizations are faced with either a costly hardware upgrade or just ignoring the vulnerabilities. However, the Synchronized Pseudo Random Number Generation protocol (SPRiNG) is a proposed solution to securing wireless communication designed to work with existing WEP enabled hardware devices. Replacing networking components with hardware that implements other security measures such as the Wi-Fi Protected Access protocol (WPA) can be very costly. Therefore, a solution such as SPRiNG that can be implemented with a software or a firmware upgrade on existing WEP enabled hardware is desirable. Using simulation, this paper provides a performance analysis of the SPRiNG protocol's increased overhead. We determine that SPRiNG will perform acceptably with up to 20% more than normal network loss.