Weaknesses of Security Mechanisms in 802.11 Wireless Networks

Jump to Page:
  • Facebook
  • Twitter
  • Delicious
  • Digg
  • StumbleUpon
  • Email
  • RSS

Wireless Local Area Networks are commonly in use from the majority of Internet users for home usage, airports, Internet cafes and other places. Since those networks are not limited to wired connected devices, the introduction of Cryptography protocols was made early. This article focuses on the evolution of those protocols and the security threats that leads it. In order to confirm the insecurity level of each Protocol, laboratory known attacks and exploits were launched against Wireless Network with different Cryptography protocols.     The findings of this study confirm the existence of successful attack methods against some of the protocols, and the considerations that have been made in the later to increase Wireless Networks Security.

I.    INTRODUCTION

Over the last century, a continuous evolution is taking place in digital informatics world. This evolution became commonly acknowledged -and part of our lives- with Digital Networks. While wired Local Area Networks (LANs) were spreading their existence in home and office networks, the need of mobility and flexibility brought another technology to the foreground, the Wireless Networks. The advantages over a wired network are many, but with consequences on range, transmission rate and –the purpose of this study- security considerations (GURKAS, ZAIM and AYDIN, 2006: 123) (LIU Wu, Hai-xin and Jian-ping, 2010: 1) (BULBUL, BATMAZ and OZEL, 2008: 1). Wireless Networks became available at the early 90’s with different vendors producing devices that can communicate on frequency bands of 900mhz and 2.4Ghz. The need of a standard to provide interoperability among the different technology for WLAN products, led in 1999 to the introduction of IEEE Std 802.11 and many amendments since then (IEEE, 2007: iv). Wi-Fi is a subset of this standard and it is managed by the Wifi Alliance (CACHE, WRIGHT and LIU, 2010: 8; Wi-Fi Alliance, 1999).

Figure1: Airodump-ng  scans for Wireless Networks in range.

Figure1: Airodump-ng scans for Wireless Networks in range.

The main security concern behind wireless communications is that the information is being broadcast to everyone on same radio frequency and not trough a wired medium. That makes a Wi-fi network vulnerable to many attacks like Wardriving, Eavesdropping and others (Yuan et al., 2008: 6). In order to introduce security countermeasures, IEEE and Wi-Fi Alliance included encryption techniques such as WEP, WPA, WPA2 (CACHE, WRIGHT and LIU, 2010: 9; NIST, 2007: 20-21) (Mateti, 2005) that we will analyze and test in this study. While those security concerns and security protocols have been adopted from the majority of WLANs devices vendors, a passive scanning (Wi-Fi NIC on passive mode) for Wireless Networks in range, showed that (Figure1) many home and business networks are using vulnerable (Results of this study) security methods to protect their data from an attacker.

Georgalas Thanasis Georgalas Thanasis (7 Posts)

Professor of Computer Science / Software Engineer, M.Sc, M.A. Athens, Greece


Jump to Page:            II. Background Study »

17 Comments

rugs ikea 09-06-2014, 21:10

Greetings from Los angeles! I’m bored to tears at work so I decided to browse your website
on my iphone during lunch break. I enjoy the knowledge you
present here and can’t wait to take a look when I
get home. I’m shocked at how fast your blog loaded on my cell
phone .. I’m not even using WIFI, just 3G ..
Anyways, great site!

Reply
www.therugbyblog.com 13-06-2014, 12:17

Hola! I’ve been reading your web site for some time now and finally got the courage to
go ahead and give you a shout out from Kingwood Texas!
Just wanted to mention keep up the good work!

Reply
thing 08-10-2014, 11:58

Hey There. I found your blog using msn. This is a
really well written article. I will be sure to bookmark it and return to read more
of your useful information. Thanks for the post.
I will certainly comeback.

Reply
woolworths discount code 14-11-2014, 10:43

woolworths discount code

Weaknesses of Security Mechanisms in 802.11 Wireless Networks – ITwalker^3

Reply
see this here 14-11-2014, 19:48

see this here

Weaknesses of Security Mechanisms in 802.11 Wireless Networks – ITwalker^3

Reply
in the know 15-11-2014, 05:55

in the know

Weaknesses of Security Mechanisms in 802.11 Wireless Networks – ITwalker^3

Reply
Go to this website for oak furniture superstore Promo code 15-11-2014, 11:08

Go to this website for oak furniture superstore Promo code

Weaknesses of Security Mechanisms in 802.11 Wireless Networks – ITwalker^3

Reply
mm1000 creatine reviews 15-11-2014, 15:11

mm1000 creatine reviews

Weaknesses of Security Mechanisms in 802.11 Wireless Networks – ITwalker^3

Reply
http://www.rockspringsairport.com/ 16-11-2014, 02:53

http://www.rockspringsairport.com/

Weaknesses of Security Mechanisms in 802.11 Wireless Networks – ITwalker^3

Reply
benefit cosmetics creed fragrance samples 16-11-2014, 04:11

benefit cosmetics creed fragrance samples

Weaknesses of Security Mechanisms in 802.11 Wireless Networks – ITwalker^3

Reply
http://grpn.pl/On/clinique_cosmetics_ingredients_list_8748378 16-11-2014, 05:36

http://grpn.pl/On/clinique_cosmetics_ingredients_list_8748378

Weaknesses of Security Mechanisms in 802.11 Wireless Networks – ITwalker^3

Reply
check this link right here now 16-11-2014, 07:06

check this link right here now

Weaknesses of Security Mechanisms in 802.11 Wireless Networks – ITwalker^3

Reply
read the full info here 16-11-2014, 07:59

read the full info here

Weaknesses of Security Mechanisms in 802.11 Wireless Networks – ITwalker^3

Reply
Queen Voucher Code 16-11-2014, 12:09

Queen Voucher Code

Weaknesses of Security Mechanisms in 802.11 Wireless Networks – ITwalker^3

Reply
optimum nutrition whey protein 10lb bag 16-11-2014, 18:29

optimum nutrition whey protein 10lb bag

Weaknesses of Security Mechanisms in 802.11 Wireless Networks – ITwalker^3

Reply
on bing 16-11-2014, 23:25

on bing

Weaknesses of Security Mechanisms in 802.11 Wireless Networks – ITwalker^3

Reply
easy songs to sing 22-11-2014, 07:13

Hi, I think your blog might be having browser compatibility issues.
When I look at your blog site in Ie, it looks fine but when opening in Internet Explorer, it has some overlapping.
I just wanted to give you a quick heads up! Other then that, great blog!

Reply

Leave a Reply

*
17 Comments