Enhancing Message Privacy in WEP

Darshan Purandare, Ratan Guha

Abstract

The Wired Equivalent Privacy (WEP) protocol for networks based on 802.11 standards has been shown to have several security flaws. In this paper we have proposed a modification to the existing WEP protocol to make it more secure. We also develop an IV avoidance algorithm that eliminates Initialization Vector (IV) collision problem by assigning unique pattern of IV bits to each node. We achieve Message Privacy by ensuring that the encryption is not breached. The idea is to update the shared secret key frequently based on factors like network traffic and number of transmitted frames. We show that frequent rekeying thwarts all kinds of cryptanalytic attacks on the WEP.

References

  1. N.Borisov, I. Goldberg, and D.Wagner. Intercepting mobile communications: The insecurity of 802.11. In MOBICOM 2001, Rome, Italy, July 2001.
  2. S.Fluhrer, I.Mantin, and A.Shamir. Weaknesses in the key-scheduling algorithm of RC4. In Eighth Annual Workshop on Selected Areas in Cryptography, Toronto, Canada, Aug. 2001.
  3. L.M.S.C of the IEEE Computer Society. Wireless LAN medium access control (MAC) and physical layer specifications. IEEE Standard 802.11, 1999 Edition, 1999.
  4. J.R.Walker. Unsafe at any key size; an analysis of the WEP encapsulation. IEEE Document 802.11-00/362, Oct 2000.
  5. W.A.Arbaugh, N.Shankar, and Y.J Wan. Your 802.11 wireless network has no clothes. In IEEE International Conference on Wireless LANs and Home Networks.
  6. J.Edney and W.A.Arabaugh, “Real 802.11 Security Wi-Fi Protected Access and 802.11i”, 2004, Pearsons Education Inc.
  7. William Stallings, Cryptography and Network Security, Principles and Practices”, 3rd Edition, 2003, Pearsons Educations.
  8. A.Stubblefield, J.Ioannaidis, and A.D.Rubin. ACM Transactions on Information and Security Security, Vol. 7, No. 2, May 2004, Pages 319-332.
  9. http://en.wikipedia.org/wiki/Birthday_attack
  10. http://csrc.nist.gov/wireless/S10_802.11i%20Overview-jw1.pdf
Download


Paper Citation


in Harvard Style

Purandare D. and Guha R. (2005). Enhancing Message Privacy in WEP . In Proceedings of the 4th International Workshop on Wireless Information Systems - Volume 1: WIS, (ICEIS 2005) ISBN 972-8865-21-X, pages 23-32. DOI: 10.5220/0002570700230032


in Bibtex Style

@conference{wis05,
author={Darshan Purandare and Ratan Guha},
title={Enhancing Message Privacy in WEP},
booktitle={Proceedings of the 4th International Workshop on Wireless Information Systems - Volume 1: WIS, (ICEIS 2005)},
year={2005},
pages={23-32},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002570700230032},
isbn={972-8865-21-X},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 4th International Workshop on Wireless Information Systems - Volume 1: WIS, (ICEIS 2005)
TI - Enhancing Message Privacy in WEP
SN - 972-8865-21-X
AU - Purandare D.
AU - Guha R.
PY - 2005
SP - 23
EP - 32
DO - 10.5220/0002570700230032