publication . Article . 2008

Fundamentos prácticos de seguridad en redes inalámbricas IEEE 802.11

Sarmiento, Oscar P.; Fabio G. Guerrero; David Rey Argote;
  • Published: 01 Aug 2008
Abstract
This article presents a tutorial/discussion of three commonly-used IEEE 802.11 wireless network security standards: WEP, WPA and WPA2. A detailed analysis of the RC4 algorithm supporting WEP is presented, including its vulnerabilities. The WPA and WPA2 encryption protocols’ most relevant aspects and technical characteristics are reviewed for a comparative analysis of the three standards in terms of the security they provide. Special attention has been paid to WEP encryption by using an educational simulation tool written in C++ Builder for facilitating the understanding of this protocol at academic level. Two practical cases of wireless security configurations u...
Subjects
free text keywords: 802.11i, 802.1x, CCMP, TKIP, WEP, WLAN, WPA, WPA2, Engineering (General). Civil engineering (General), TA1-2040

Aharoni, M., Moser, M., Muench, M. J., Grimchaw, D., Naepflin, A., Schroedel, P., Waeytens F., .BackTrack., Mar. 6, 2007. URL: http://www.remote-exploit.org/ Baghaei, N., Hunt, R., Security performance of loaded IEEE 802.11b wireless networks., Computer Communications, Elsevier, U.K., Vol. 27, No. 17, 2004pp. 1746-1756.

Balenson, D., .Privacy Enhancement for Internet Electronic Mail. Part III: Algorithms, Modes, and Identifiers., Request for Comments (Standard) 1423, Internet Engineering Task Force, 1999.

Ioannidis, J., Rubin, A. D., Stubblefield, A., Using the Fluhrer, Mantin and Shamir Attack to Break WEP., AT&T Labs Technical Report TD-4ZCPZZ, Aug 6, 2001. URL http://www.isoc.org/isoc/conferences/ndss/02/papers/stu bbl.pdf

LAN MAN Standards Committee of the IEEE Computer Society., Par 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications., IEEE Standard 802.11, 1999 Edition.

LAN MAN Standards Committee of the IEEE Computer Society., Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications., Amendment 6: medium access control (MAC) security enhancements. IEEE Standard 802.11i, 2004 Edition (2004).

Moskowitz, R., Weakness in Passphrase Choice in WPA Interface., Nov 4, 2003. URL: http://wifinetnews.com/ archives/002452.html.

NIST (National Institute of Standards an Technology)., Announcing the Advanced Encryption Standard (AES) - Federal Information Processing Standards Publication 197., Nov. 26, 2001. URL. http://csrc.nist.gov/ publications/fips/fips197/fips-197.pdf.

Pyshkin, A., Tews, E., Weinmann, R. P., Breaking 104 bit WEP in less than 60 seconds., Apr 1, 2007. URL: http:// eprint.iacr.org/2007/120.

Schneier, B., .Applied Cryptography: Protocols, Algorithms, and source code in C., 2a ed., New York, John Wiley and Sons, Inc., 1996, pp 397-398.

Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue
publication . Article . 2008

Fundamentos prácticos de seguridad en redes inalámbricas IEEE 802.11

Sarmiento, Oscar P.; Fabio G. Guerrero; David Rey Argote;