WSN  Vol.2 No.3 , March 2010
WEP and WPA Improvement
ABSTRACT
This paper aims to describe a solution to improve wireless network security protocols WEP and WPA based on a modified RC4 algorithm for encryption, and based on initialization vector (IV) with secret key for a session key exchange, and new mutual authentication mechanism.

Cite this paper
nullM. ElGili, S. Talab and A. Ali, "WEP and WPA Improvement," Wireless Sensor Network, Vol. 2 No. 3, 2010, pp. 239-242. doi: 10.4236/wsn.2010.23032.
References
[1]   “WEP fix using RC4 fast packet keying,” February 2002, http://www.rsasecurity.com/rsalabs/technotes/wep-fix.html.

[2]   S. Jariwala, “Enhancing wireless security with WPA,” April 2004.

[3]   A. Jain and S. Karan, “Wireless LAN security”.

[4]   M. S. Ahmad and V. Ramachandran, “Cafe latte with a free topping of cracked WEP—retrieving WEP keys from road warriors”.

[5]   M. O. Pervaiz, M. Cardei, and J. Wu, “Security in wireless local area networks,” Department of Computer Science & Engine.

[6]   D. Kalina, “WAP, WPA, and EAP,” March 2005, http://islab.oregonstate.edu/koc/ece478/05Report/Kalina.doc

[7]   T. Takahashi, “WPA passive dictionary attack overview,” http://www.personalwireless.org/tools/WPA-Cracker/WPA_Passive Dictionary_Attack_Overview.pdf

[8]   V. Moen, H. Raddum, and K. J. Hole, “Weaknesses in the Temporal Key Hash of WPA,” http://bora.uib.no/bitstream/1956/1901/21/Paper4 Moen.pdf

[9]   H. R. Hassan and Y. Challal, “Enhanced WEP: An efficient solution to WEP threats”.

[10]   W. Stallings, “Cryptography and network security,” 3rd edition, 1999.

[11]   J.-C. Lin, Y.-H. Kao, and C.-W. Yang “Secure enhanced wireless transfer protocol,” First International Conference on Availability, Reliability and Security, 2006.

[12]   A. Klein, “Attacks on the RC4 stream cipher,” 27 February 2007.

 
 
Top