WEP and Network Security Research Paper by scribbler

WEP and Network Security
A review of the research on Wired Equivalent Privacy (WEP) and its security weaknesses.
# 153350 | 2,801 words | 11 sources | APA | 2013 | US

$19.95 Buy and instantly download this paper now


The paper examines Wired Equivalent Privacy (WEP) that concentrates on maintaining the security and protection of the wireless network. The paper explores the research on the core concepts associated with wireless networking and on the weaknesses of WEP. The paper discusses the management and size of the key, the size of the initialization vector, the integrity check value and the use of tunneling protocols that are encrypted, and looks at how WEP2 has been developed and implemented to deal with the security issues of the wireless network.

Wireless Network
Core Concepts
Types of Wireless Connections
Overview of Wireless Networks
What is WEP?
Weaknesses of WEP
Management and Size of the Key
Size of the Initialization Vector
Integrity Check Value
Weak RC4
Defense Mechanism against Passive Attack
Forgery of Authentication Messages
Intrusion Detection Strategies and Making WEP Stronger
Modifications in WEP
WEP Plus
Dynamic WEP

From the Paper:

""WEP is the privacy protocol specified in IEEE 802.11 to provide wireless LAN users protection against casual eavesdropping" (Serge& Vuagnoux, 2007)
. It stands for Wired Equivalent Privacy. It concentrates on maintaining the security and protection of the wireless network. Once it is activated in the wireless network, 802.11 packet is encrypted individually and independently. At the same time, cipher system of RC4 is created with the help of RC4 key of 64 bit. "This key is composed of a 24 bit initialization vector (IV) and a 40 bit WEP key.The encrypted packet is generated with a bitwise exclusive OR (XOR) of the original packet and the RC4 stream" (dam Stubble, Ioannidis & Rubin, 2004). The sender is responsible for selecting the IV and thus, it should be changed in order to ensure that each and every packet does not have a mutual cipher stream. In other words, each and every packet must have an individual and unique cipher stream. 40 bit key or WEP-40 is used by the basic WEP of 64 bit. It has been connected with the initialization vector (IV), which is of 24-bit. This has been done in order to create the RC4 traffic key (Klein, 2008)"

Sample of Sources Used:

  • Berghel, H,& Uecker, J.(2004). Wireless Infidelity II: Airjacking. Communications of the ACM, 47(12), p15. Retrieved from http://web.ebscohost.com.ezproxy.umuc.edu/ehost/pdfviewer
  • Berghel, H., & Uecker, J.(2005).WIFI Attack Vectors. Communications of the ACM, Aug2005, 48(8), p21-28. Retrieved from http://web.ebscohost.com.ezproxy.umuc.edu/ehost/pdfviewer
  • Lashkari, A., H., Danesh, M., S., & Samadi, B. (2009, September). A Survey on Wireless Security protocols (WEP,WPA and WPA2/802.11i). Retrieved from http://www.ivanescobar.com/survey%20wifi.pdf
  • Abouzakhar, N., Manson, G. (2003), "Networks security measures using neuro-fuzzy agents", Information Management & Computer Security, Vol. 11 No.1, pp.33-8.
  • Agrawal, M. (2003), "Demystifying wireless technologies: navigating through the wireless technology maze", Communications of the Association for Information Systems, Vol. 12 pp.166-82.

Cite this Research Paper:

APA Format

WEP and Network Security (2013, May 23) Retrieved September 19, 2019, from https://www.academon.com/research-paper/wep-and-network-security-153350/

MLA Format

"WEP and Network Security" 23 May 2013. Web. 19 September. 2019. <https://www.academon.com/research-paper/wep-and-network-security-153350/>