Documente Academic
Documente Profesional
Documente Cultură
1. Introduction
Wireless security is different from wired security. It gives potential attackers easy
transport medium access. This access significantly increases the threat that any
security architecture must address. Wireless security requires a slightly different
thinking. The goals of 802.11 security are:
The security mechanisms for the wireless 802.11 standards known as wired equivalent
privacy (WEP). WEP provides a level of security similar to the wired networks. It is a
standard of security for IEEE 802.11a and b and offers authentication and data encryption
between a host and a wireless base station, using a secret shared key. The essence of this
protocol between a host and a base station (wireless access point) is as follows:
Fist, a 40-bit secret key k, known by both the host and the base station is created. A 24-
bit initialization field to be used to encrypt a single frame is appended to this key.
WEP encapsulation
• compute the integrity checksum c = c(M) of message M and concatenate the two to
obtain the plaintext P = 〈M, c〉
• Upon receiving the frame F, the access point performs the following actions
3.1 Authentication
There are three methods of authentication can be used with WEP: Open System
authentication, Closed Network authentication and Shared Key authentication.
Only the clients with the knowledge of the network name, or SSID, can join. Here, the
AP is configured to not send the beacon. The SSID acts as a shared secret. It is
proprietary.
Weakness
• Several management frames contain SSID
• These frames are broadcast in the clear even when WEP is enabled
• An attacker can easily sniff the secret (SSID)
802.11 does not specify any key management. Key management is left as an exercise for
vendors. The standard allows for a unique key for each mobile station however. In
practice, most installations use a single key for an entire network.
4. Weakness of WEP