Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Analyzing and Improving the IEEE 802.11-MAC Protocol for Wireless LANs
MASCOTS '96 Proceedings of the 4th International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)
ACM Transactions on Information and System Security (TISSEC)
Wireless infidelity II: airjacking
Communications of the ACM - The Blogosphere
Security issues in IEEE 802.11 wireless local area networks: a survey: Research Articles
Wireless Communications & Mobile Computing - Special Issue: Emerging WLAN Apllications and Technologies
The Final Nail in WEP's Coffin
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
A note on the fragility of the "Michael" message integrity code
IEEE Transactions on Wireless Communications
Medium access control of wireless LANs for mobile computing
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.24 |
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has ''major security flaws'' thus wireless local area networks (WLANs) using the protocol are vulnerable to attacks. In this paper, we propose a scrambling algorithm that reduces the security vulnerabilities of the WEP. The algorithm randomizes the data and prevents access from unauthorized users by adding some standard randomness to it. This random characteristic is a function of the private attribute shared between transmitter and receiver only. In this approach the randomness is achieved by RC4 algorithm, and the distribution of the randomness is provided with different algorithms to increase the complexity of rectifying the encrypted data and optimize utilization of the randomness. The algorithm is developed with a consideration for the least computational requirements to achieve both power and cost efficiency. The proposed software solution takes the WEP output as input and the original WEP implementation is not touched, thus it is an easy patch for the deployed systems.