Back to Search Start Over

NAPADI NA IEEE802.11 BEŽIČNE MREŽE.

Authors :
Tepšić, Dejan M.
Veinović, Mladen Đ.
Source :
Military Technical Courier / Vojnotehnicki Glasnik. apr-jun2013, Vol. 61 Issue 2, p242-271. 30p.
Publication Year :
2013

Abstract

Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i) later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. [ABSTRACT FROM AUTHOR]

Details

Language :
Serbian
ISSN :
00428469
Volume :
61
Issue :
2
Database :
Academic Search Index
Journal :
Military Technical Courier / Vojnotehnicki Glasnik
Publication Type :
Academic Journal
Accession number :
88917282
Full Text :
https://doi.org/10.5937/vojtehg61-2301