Generating Key Streams in Infrastructure WLAN Using Bit Rate

Due to the rapid growth of wireless networking, the fallible security issues of the 802.11 standard have come under close scrutiny. There are serious security issues that need to be sorted out before everyone is willing to transmit valuable corporate information on a wireless network. This paper focuses on inherent flaws in Wired Equivalent Privacy protocol (WEP)used by the 802.11 standard, Temporal Key Integrity Protocol(TKIP)which is considered an interim solution to legacy 802.11 equipment. Counter Mode/CBCMAC protocol which is based on Advanced Encryption Standard (AES) will not work on many of the current shipping cards which are based on 802.11b/g.

Provided by: International Journal of Engineering Science and Technology (IJEST) Topic: Mobility Date Added: Dec 2010 Format: PDF

Find By Topic