Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30172
Weaknesses and Strengths Analysis over Wireless Network Security Standards

Authors: Daniel Padilla, Edward Guillen

Abstract:

Several wireless networks security standards have been proposed and widely implemented in both business and home environments in order to protect the network from unauthorized access. However, the implementation of such standards is usually achieved by network administrators without even knowing the standards- weaknesses and strengths. The intention of this paper is to evaluate and analyze the impact over the network-s security due to the implementation of the wireless networks security standards WEP, WPA and WLAN 802.1X.

Keywords: 802.1X, vulnerabilities analysis, WEP, wireless security, WPA.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1063451

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1750

References:


[1] E. Guillen, S. Loaiza, "An'alisis de Vulnerabilidades de Tres Est'andares de Seguridad para Redes de A' rea Local Inala'mbricas," GISSIC Investigation Group, Telecommunications Engineering Department, Nueva Granada Military University, Bogot'a-Colombia, 2008.
[2] Institute of Electrical and Electronics Engineers, "IEEE Standard for Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, 1999 Edition (R2003).
[3] C. Grogans, J. Bethea, I. Hamdan, "RC4 Encryption Algorithm," North Carolina Agricultural and Technical State University , March 5, 2000.
[4] Wi-Fi Alliance, "Wi-Fi Protected Access: Strong, standards-based, interoperable security for todays Wi-Fi networks," 2003.
[5] C. Rigney, S. Willens, Livingston, A. Rubens, Merit, W. Simpson, Daydreamer, "Remote Authentication Dial In User Service (RADIUS)," IETF RFC 2865, June 2000.
[6] J. Hassell, "RADIUS - Securing Public Access to Private Resources," O-Reilly & Associates, ISBN: 0596003226.
[7] K. Hamzeh, G. Pall, W. Verthein, J. Taaru, W. Little, G. Zorn, "Point-to- Point Tunneling Protocol (PPTP)," IETF RFC 2637, July 1999.
[8] D. Stanley, J. Walker, B. Aboba, "Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs," IETF RFC 4017, March 2005.
[9] Institute of Electrical and Electronics Engineers, "IEEE Standard for Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Amendment 6: Medium Access Control (MAC) Security Enhancements", 2003.
[10] L, Barken, "How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN," Prentice Hall, ISBN: 0-13-140206-42003, pp. 224.
[11] T. Newsham, "Cracking WEP Keys. Applying known techniques to WEP keys," @Stake, 2001, pp. 35.
[12] T. Dierks, E. Rescorla, "The Transport Layer Security (TLS) Protocol: Version 1.2," IETF RFC 5246, August 2008.
[13] E. Rescorla, M. Ray, S. Dispensa, N. Oskov, "Transport Layer Security (TLS) Renegotiation Indication Extension," IETF RFC 5746, February 2010.
[14] E. Guillen, D. Padilla, Y. Colorado, "Weaknesses and Strengths Analysis over Network-based Intrusion Detection and Prevention Systems," Proceedings of the IEEE Latin-American Conference on Communications 2009, LATINCOM -09, pp. 1-5.
[15] E. Guillen, D. Padilla, K. Martinez, "Vulnerabilities and Performance Analysis over Fingerprint Recognition Systems," Proceedings of The 2010 World Congress in Computer Science, Computer Engineering, and Applied Computing, WORLDCOMP10.