Wired Equivalent Privacy

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 753 Experts worldwide ranked by ideXlab platform

Jukka Saarinen - One of the best experts on this subject based on the ideXlab platform.

  • EUSIPCO - Hardware implementation of the improved WEP and RC4 encryption algorithms for wireless terminals
    2000
    Co-Authors: Panu Hämäläinen, Marko Hännikäinen, Timo Hämäläinen, Jukka Saarinen
    Abstract:

    This paper presents hardware implementations for Improved Wired Equivalent Privacy (IWEP) and RC4 ("Ron's Cipher #4") encryption algorithms. IWEP is a block algorithm providing light-strength encryption. The algorithm has been designed for a new Wireless Local Area Network (WLAN), called TUTWLAN (Tampere University of Technology Wireless Local Area Network). On the contrary RC4, developed by RSA Data Security, Inc., is a powerful stream algorithm used in many commercial products. It is also utilized in the Wired Equivalent Privacy (WEP) standard algorithm for WLANs. The objective of this work has been to study the suitability of hardware implementation for these previously software-implemented ciphers. Hardware is needed to replace software especially in wireless multimedia terminals, in which real-time data processing and limited on-chip memory sizes are key elements. The implementations are made in Very highspeed integrated circuit Hardware Description Language (VHDL) on Xilinx Field Programmable Gate Array (FPGA) chips.

  • Hardware implementation of the improved WEP and RC4 encryption algorithms for wireless terminals
    2000 10th European Signal Processing Conference, 2000
    Co-Authors: Panu Hämäläinen, Marko Hännikäinen, Timo Hämäläinen, Jukka Saarinen
    Abstract:

    This paper presents hardware implementations for Improved Wired Equivalent Privacy (IWEP) and RC4 ("Ron's Cipher #4") encryption algorithms. IWEP is a block algorithm providing light-strength encryption. The algorithm has been designed for a new Wireless Local Area Network (WLAN), called TUTWLAN (Tampere University of Technology Wireless Local Area Network). On the contrary RC4, developed by RSA Data Security, Inc., is a powerful stream algorithm used in many commercial products. It is also utilized in the Wired Equivalent Privacy (WEP) standard algorithm for WLANs. The objective of this work has been to study the suitability of hardware implementation for these previously software-implemented ciphers. Hardware is needed to replace software especially in wireless multimedia terminals, in which real-time data processing and limited on-chip memory sizes are key elements. The implementations are made in Very highspeed integrated circuit Hardware Description Language (VHDL) on Xilinx Field Programmable Gate Array (FPGA) chips.

David Wagner - One of the best experts on this subject based on the ideXlab platform.

  • MobiCom - Intercepting mobile communications: the insecurity of 802.11
    Proceedings of the 7th annual international conference on Mobile computing and networking - MobiCom '01, 2001
    Co-Authors: Nedyalko Borisov, Ian Goldberg, David Wagner
    Abstract:

    The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, used to protect link-layer communications from eavesdropping and other attacks. We have discovered several serious security flaws in the protocol, stemming from mis-application of cryptographic primitives. The flaws lead to a number of practical attacks that demonstrate that WEP fails to achieve its security goals. In this paper, we discuss in detail each of the flaws, the underlying security principle violations, and the ensuing attacks.

  • Intercepting mobile communications: the insecurity of 802.11
    Proceedings of the 7th annual international conference on Mobile computing and networking, 2001
    Co-Authors: Nedyalko Borisov, Ian Goldberg, David Wagner
    Abstract:

    The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, used to protect link-layer communications from eavesdropping and other attacks. We have discovered several serious security flaws in the protocol, stemming from mis-application of cryptographic primitives. The flaws lead to a number of practical attacks that demonstrate that WEP fails to achieve its security goals. In this paper, we discuss in detail each of the flaws, the underlying security principle violations, and the ensuing attacks.

Mesut Ozel - One of the best experts on this subject based on the ideXlab platform.

  • e-Forensics - Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols
    Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications Information and Multimedia, 2008
    Co-Authors: Halil Ibrahim Bulbul, Ihsan Batmaz, Mesut Ozel
    Abstract:

    Wireless Local Area Networks (WLANs) are gaining popularity as they are fast, cost effective, flexible and easy to use. They are, however, faced with some serious security challenges and the choice of security protocol is a critical issue for IT administrators. The goal of this paper is to make the non-specialist reader aware of the disadvantages and threats of the wireless security protocols. WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols are examined in this respect. Then they are compared via the common features in order to give some insight to those who work with WLANs. We hope this paper give boost to the IT security staff and clarify the common questions of the non-specialist reader. This paper is a compilation of the wireless security weaknesses and counter measures that are put forward until recently. We believe that a thorough understanding of this paper makes the non-specialist reader have a complete review of wireless security and vulnerabilities associated with it.

  • Wireless network security: Comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols
    e-Forensics 2008 - Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications Information and Multi, 2008
    Co-Authors: Halil Ibrahim Bulbul, Ihsan Batmaz, Mesut Ozel
    Abstract:

    © 2008 ICST. Wireless Local Area Networks (WLANs) are gaining popularity as they are fast, cost effective, flexible and easy to use. They are, however, faced with some serious security challenges and the choice of security protocol is a critical issue for IT administrators. The goal of this paper is to make the non-specialist reader aware of the disadvantages and threats of the wireless security protocols. WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols are examined in this respect. Then they are compared via the common features in order to give some insight to those who work with WLANs. We hope this paper give boost to the IT security staff and clarify the common questions of the nonspecialist reader. This paper is a compilation of the wireless security weaknesses and counter measures that are put forward until recently. We believe that a thorough understanding of this paper makes the non-specialist reader have a complete review of wireless security and vulnerabilities associated with it.

Mohammed Boulmalf - One of the best experts on this subject based on the ideXlab platform.

  • Analysis of the effect of security on data and voice traffic in WLAN
    Computer Communications, 2007
    Co-Authors: Mohammed Boulmalf, Ezedin Barka, Abderrahmane Lakas
    Abstract:

    This paper investigates the impact of security on the performance of WLAN. More specifically, it analyzes the impact of different encryption techniques used by two security protocols, namely Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) on the throughput and delay over WLAN IEEE 802.11g. Moreover, in this paper, we investigate the effect of encryption on the performance of wireless transmission during the handover process when a mobile device disassociates from one access point and re-associates with another one. In addition, this paper addresses the impact of the use of security in WLAN specifically on voice traffic namely the incurred transmission delay and jitter.

  • On the Impact of Security on the Performance of WLANs
    Journal of Communications, 2007
    Co-Authors: Ezedin Barka, Mohammed Boulmalf
    Abstract:

    This paper investigates the impact of security on the performance of WLAN. More specifically, it analyzes the impact of different implementations of encryption techniques used by two security protocols, namely Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) on the throughput over WLAN IEEE 802.11g. This paper also addresses the different issues related to the security protocols currently used in WLAN IEEE 802.11g and demonstrates how these issues affect the final results of the experiments conducted. The results show that within the same access point range the security adds moderate degradation on the throughput that may affect some applications over both infrastructure and ad hoc WLANs.

  • Impact of Encryption on the Throughput of Infrastructure WLAN IEEE 802.11g
    2007 IEEE Wireless Communications and Networking Conference, 2007
    Co-Authors: Ezedin Barka, Mohammed Boulmalf
    Abstract:

    This paper investigates the impact of security on the performance of WLAN. More specifically, it analyzes the impact of applying encryption used by the well-known security protocol Wired Equivalent Privacy (WEP) on the throughput over an infrastructure WLAN, IEEE 802.11g. This paper also addresses the different issues related to the security protocols currently used in WLAN IEEE 802.11g and demonstrates how these issues affect the final results of the experiments conducted. The main result is that the security adds moderate degradation on the throughput that may affect some applications over infrastructure WLANs.

  • WCNC - Impact of Encryption on the Throughput of Infrastructure WLAN IEEE 802.11g
    2007 IEEE Wireless Communications and Networking Conference, 2007
    Co-Authors: Ezedin Barka, Mohammed Boulmalf
    Abstract:

    This paper investigates the impact of security on the performance of WLAN. More specifically, it analyzes the impact of applying encryption used by the well-known security protocol Wired Equivalent Privacy (WEP) on the throughput over an infrastructure WLAN, IEEE 802.11g. This paper also addresses the different issues related to the security protocols currently used in WLAN IEEE 802.11g and demonstrates how these issues affect the final results of the experiments conducted. The main result is that the security adds moderate degradation on the throughput that may affect some applications over infrastructure WLANs.

  • Analysis of the effect of security on data and voice traffic in WLAN
    Computer Communications, 2007
    Co-Authors: Mohammed Boulmalf, Ezedin Barka, Abderrahmane Lakas
    Abstract:

    This paper investigates the impact of security on the performance of WLAN. More specifically, it analyzes the impact of different encryption techniques used by two security protocols, namely Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) on the throughput and delay over WLAN IEEE 802.11g. Moreover, in this paper, we investigate the effect of encryption on the performance of wireless transmission during the handover process when a mobile device disassociates from one access point and re-associates with another one. In addition, this paper addresses the impact of the use of security in WLAN specifically on voice traffic namely the incurred transmission delay and jitter. © 2007 Elsevier B.V. All rights reserved.

Ezedin Barka - One of the best experts on this subject based on the ideXlab platform.

  • Analysis of the effect of security on data and voice traffic in WLAN
    Computer Communications, 2007
    Co-Authors: Mohammed Boulmalf, Ezedin Barka, Abderrahmane Lakas
    Abstract:

    This paper investigates the impact of security on the performance of WLAN. More specifically, it analyzes the impact of different encryption techniques used by two security protocols, namely Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) on the throughput and delay over WLAN IEEE 802.11g. Moreover, in this paper, we investigate the effect of encryption on the performance of wireless transmission during the handover process when a mobile device disassociates from one access point and re-associates with another one. In addition, this paper addresses the impact of the use of security in WLAN specifically on voice traffic namely the incurred transmission delay and jitter.

  • On the Impact of Security on the Performance of WLANs
    Journal of Communications, 2007
    Co-Authors: Ezedin Barka, Mohammed Boulmalf
    Abstract:

    This paper investigates the impact of security on the performance of WLAN. More specifically, it analyzes the impact of different implementations of encryption techniques used by two security protocols, namely Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) on the throughput over WLAN IEEE 802.11g. This paper also addresses the different issues related to the security protocols currently used in WLAN IEEE 802.11g and demonstrates how these issues affect the final results of the experiments conducted. The results show that within the same access point range the security adds moderate degradation on the throughput that may affect some applications over both infrastructure and ad hoc WLANs.

  • Impact of Encryption on the Throughput of Infrastructure WLAN IEEE 802.11g
    2007 IEEE Wireless Communications and Networking Conference, 2007
    Co-Authors: Ezedin Barka, Mohammed Boulmalf
    Abstract:

    This paper investigates the impact of security on the performance of WLAN. More specifically, it analyzes the impact of applying encryption used by the well-known security protocol Wired Equivalent Privacy (WEP) on the throughput over an infrastructure WLAN, IEEE 802.11g. This paper also addresses the different issues related to the security protocols currently used in WLAN IEEE 802.11g and demonstrates how these issues affect the final results of the experiments conducted. The main result is that the security adds moderate degradation on the throughput that may affect some applications over infrastructure WLANs.

  • WCNC - Impact of Encryption on the Throughput of Infrastructure WLAN IEEE 802.11g
    2007 IEEE Wireless Communications and Networking Conference, 2007
    Co-Authors: Ezedin Barka, Mohammed Boulmalf
    Abstract:

    This paper investigates the impact of security on the performance of WLAN. More specifically, it analyzes the impact of applying encryption used by the well-known security protocol Wired Equivalent Privacy (WEP) on the throughput over an infrastructure WLAN, IEEE 802.11g. This paper also addresses the different issues related to the security protocols currently used in WLAN IEEE 802.11g and demonstrates how these issues affect the final results of the experiments conducted. The main result is that the security adds moderate degradation on the throughput that may affect some applications over infrastructure WLANs.

  • Analysis of the effect of security on data and voice traffic in WLAN
    Computer Communications, 2007
    Co-Authors: Mohammed Boulmalf, Ezedin Barka, Abderrahmane Lakas
    Abstract:

    This paper investigates the impact of security on the performance of WLAN. More specifically, it analyzes the impact of different encryption techniques used by two security protocols, namely Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) on the throughput and delay over WLAN IEEE 802.11g. Moreover, in this paper, we investigate the effect of encryption on the performance of wireless transmission during the handover process when a mobile device disassociates from one access point and re-associates with another one. In addition, this paper addresses the impact of the use of security in WLAN specifically on voice traffic namely the incurred transmission delay and jitter. © 2007 Elsevier B.V. All rights reserved.