Mobility

A WEP Post-Processing Algorithm for a Robust 802.11 WLAN Implementation

Download Now Free registration required

Executive Summary

Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "Major security flaws" thus Wireless Local Area Networks (WLANs) using the protocol are vulnerable to attacks. This paper proposes a scrambling algorithm that reduces the security vulnerabilities of the WEP. The algorithm randomizes the data and prevents access from unauthorized users by adding some standard randomness to it. This random characteristic is a function of the private attribute shared between transmitter and receiver only. In this approach the randomness is achieved by RC4 algorithm, and the distribution of the randomness is provided with different algorithms to increase the complexity of rectifying the encrypted data and optimize utilization of the randomness.

  • Format: PDF
  • Size: 289.3 KB