Thursday, January 9, 2020
Limitations Of Wired Equivalent Privacy - 2704 Words
Limitations of Wired Equivalent Privacy Presented in IAAS670 Wireless and Mobile Security By Joel Bramblett, Oluwaseun Onibudo, and Michelle Rowton Davenport University October 21, 2014 Nasser Halwani Professor Abstract The Wired Equivalent Privacy algorithm (WEP) is a method of securing IEEE 802.11 wireless internet connections. This algorithm was accepted by the IEEE (The Institute of Electrical and Electronics Engineers) in 1999 and it was subsequently used as the standard for wireless security JATIT (2012). Just over 5 years after its ratification by IEEE, the same body phased it out after some FBI personnel demonstrated how easy it was to crack (in as little as three minutes) (Cheung, 2005). This marked the entry of WPA/WPA2 (Wi-Fi Protected Access), but this is not our area of concentration in this paper. This paper opens with an introduction into the world of WEP and proceeds by concentrating on the various vulnerabilities that led to the abandonment of the WEP as a secure protocol for wireless networks. Our discussion will center on WEP limitations regarding initialization vectors and the method of encryption –RC4 vis-à -vis the probable fixes for the vulnerabilities. We will conclude by looking at the full WEP operational picture and possible recommendations for securing wireless networks in this modern age. Table of Contents Introduction 4 How WEP Works 4 Limitations 5 Limitations of the Initialization Vectors 5 Source of Initialization vectors 5 IVShow MoreRelated Wireless Networking Essay991 Words  | 4 Pagesshare files and printers, but may not be able access wired LAN resources unless one computer acts as a bridge to connect to a wired LAN. Access points (base stations) can be hardware based or software based. The hardware based access point is a separate component connected to a wired Ethernet network and or server via an interface card. Software based access points can be a computer operating with software installed and is connected to a wired Ethernet network with an interface card. The benefitsRead MoreIntroduction Of 802.11 Wlan ( Wlan )2175 Words  | 9 Pageseffective and easy to setup in big buildings and organizations. Because it’s very difficult to setup wire in old and big buildings, in WLAN we can modify anything easily because of less wiring as well as the installation cost is very less as compare to wired network. The other feature for WLAN include cost- WLANs is backbone for the regular users who access to the internet every day, giving them anytime, anywhere network access. WLAN gives freedom to the users to access on internet for variety of workRead MoreS07 the Latest Development in Networks a nd Communication1439 Words  | 6 Pagescomputing are synonymous with mobile computing. Information access via a mobile device is plagued by low available bandwidth, poor connection maintenence, poor security, and addressing problems. Unlike their wired counterparts, design of software for mobile devices must consider resource limitation, battery power and display size. Consequently, new hardware and software techniques must be developed. For example, applications need to be highly optimized for space, in order to fit in the limited memoryRead More The Next Great Wall Essay3074 Words  | 13 Pagesother hand, did not go through such a process. Restrictions on encryption technology imported to or developed within China have been put forth. Their attempts at such control contrast what the United States considers is a denial of our rights to privacy even when addressing national security. The U.S. has acknowledged the significance of supporting free encryption policies while Chin a’s restrictions have shown they are even more limiting, unenforceable and morally wrong in how it affects its citizensRead MoreThe Wlan4915 Words  | 20 Pages However, the bandwidth limitations when using switched cellular technology are severe, and data connections generally are not tolerant of the extended drop-outs that can occur. Conversely, WLANs are generally accepted to be 1Mbps links or above (although a few drop into the 100s of Kbps), short range (100s of meters) technologies which do not need to support vehicular mobility (high speed handoffs) or wide area coverage. What they do provide is the wireless equivalent of a LAN for file sharingRead MoreA Brief Note On Companies And The Largest Ever Consumer Data Breach1712 Words  | 7 Pagesparty. In the case of TJX, the company reviewed the effect if the â€Å"hand-held price-checking devices, cash registers, and the company’s computer systems†(Walker pg.4, 2013) are exploited. The vulnerabilities that TJX analyzed was mainly the Wired Equivalent Privacy the company was using in their retail locations. The company knew that this standard was outdated and exploitable by hackers. However, TJX’s chief information officer assessment of those risks were incorrect. The CIO chose to defer the upgradeRead MoreEssay on It 260 Quiz 1-51418 Words  | 6 Pagesinstalled. †¢ .NET Framework 3.0 feature (correct answer, your response) †¢ NLB †¢ WSRM †¢ WPAS Which of the following is a true statement about the number of roles a Windows Server 2008 computer can support? †¢ There are no limitations placed on the number of roles a Windows Server †¢ # of roles depends on the computer hardware configuration, hardware requirement for a role and the size of the organization (correct answer, your response) †¢ A Windows Server 2008 computer canRead More802. 11a Standard Essay1776 Words  | 8 Pages480 Mbps. 802.11n devices operate in 2.4(2.5) or 5.0 GHz bands. Speed is 300 Mbps, Security protocols are WEP, WPA, WPA2, Security level can be declared as high. This standard was approved in 2009. 802.11n is comparable in transmission speed to the wired standards. The maximum transmission speed of the standard 802.11n is about 5 times higher than the performance of classic Wi-Fi. The increase in the transmission speed in the IEEE 802.11n standard is achieved, firstly, due to the doubling of the channelRead MoreWireless Technology2031 Words  | 9 Pagestype with possibly differing bandwidth and quality-of-service requirements. The wireless network components of a complete source-destination path requires consideration of mobility, hand-off, and varying transmission and bandwidth conditions. The wired/wireless network combination provides a severe bandwidth mismatch, as well as vastly different error conditions. The processing capability of fixed vs. mobile terminals may be expected to differ significantly. This then leads to such issues to be addressedRead More E-commerce: Security and Privacy Essay2128 Words  | 9 Pages E-commerce: Security and Privacy As the evolution of the internet and purchasing online becomes popular, so do the security factors that contribute to the ways of eliminating fraud, theft, and acquiring personal information. E-commerce has created many new ways for customers to make payments including e-cash, e-cheques, and e-wallets. In the 21st century, many organizations worked hard at securing communications and payments made through e-commerce transactions. In doing so, customers would
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.