Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
SSH: secure login connections over the internet
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Application of synchronous dynamic encryption system in mobile wireless domains
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Architecture of secure cross-platform and network communications
Proceedings of the 2nd international conference on Ubiquitous information management and communication
The proactive intrusion prevention for Wireless Local Area Network
International Journal of Mobile Communications
A performance analysis of the spring protocol through simulation
SpringSim '07 Proceedings of the 2007 spring simulation multiconference - Volume 3
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Computer Communications
Research on a Novel Hashing Stream Cipher
Computational Intelligence and Security
A Light Number-Generation Scheme for Feasible and Secure Credit-Card-Payment Solutions
EC-Web '08 Proceedings of the 9th international conference on E-Commerce and Web Technologies
MobiSEC: a novel security architecture for wireless mesh networks
Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks
BootJacker: compromising computers using forced restarts
Proceedings of the 15th ACM conference on Computer and communications security
Practical attacks against WEP and WPA
Proceedings of the second ACM conference on Wireless network security
Modified WEP key management for enhancing WLAN security
International Journal of Information and Communication Technology
New Weakness in the Key-Scheduling Algorithm of RC4
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
An efficient k-anonymous localization technique for assistive environments
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
Evolution of wireless LAN security architecture to IEEE 802.11i (WPA2)
AsiaCSN '07 Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks
Design of WLAN secure system against weaknesses of the ieee 802.1x
ICHIT'06 Proceedings of the 1st international conference on Advances in hybrid information technology
Breaking 104 Bit WEP in less than 60 seconds
WISA'07 Proceedings of the 8th international conference on Information security applications
Improving users' security choices on home wireless networks
Proceedings of the Sixth Symposium on Usable Privacy and Security
Implementing disposable credit card numbers by mobile phones
Electronic Commerce Research
FMS attack-resistant WEP implementation is still broken
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Security measures in wired and wireless networks
ISIICT'09 Proceedings of the Third international conference on Innovation and Information and Communication Technology
Practical verification of WPA-TKIP vulnerabilities
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Hi-index | 0.00 |
In this paper, we present a practical key recovery attack on WEP, the link-layer security protocol for 802.11b wireless networks. The attack is based on a partial key exposure vulnerability in the RC4 stream cipher discovered by Fluhrer, Mantin, and Shamir. This paper describes how to apply this flaw to breaking WEP, our implementation of the attack, and optimizations that can be used to reduce the number of packets required for the attack. We conclude that the 802.11b WEP standard is completely insecure, and we provide recommendations on how this vulnerability could be mitigated and repaired.