Security Issues of IEEE-802.11 Wireless Networks
Islam, Chowdhury Sajadul
Sobhan, M Abdus
MetadataShow full item record
This paper focuses on the WiFi infrastructure mode attacks, vulnerabilities and available protections with respect to data confidentiality, integrity, mutual authentication and availability. It summarizes recent security solutions starting from WEP to IEEE802.11i and discusses the strengths and weaknesses of the solutions of IEEE 802.11 Wireless Local Area Network (WLAN). Generally, security concerns in the LAN world are classified into physical and logical types. There are different types of logical attacks like main-in-the-middle attack and Denial of Service attacks as well as physical security attacks like rouge APs. There are different types of threats such as AP positioning, frequency & transmitter power allocation in WLAN. In the link layer, active and passive eavesdropping, masquerading, message interception, session hijacking, jamming attacks are found to occur. Wired Equivalent Privacy (WEP) was the first logical security solution to secure WLAN, but it has many vulnerabilities. In order to provide securities against vulnerabilities of WEP, the Wi-Fi alliance proposed the TKIP to provide stronger security through a keyed cryptography Message Integrity Code (MIC), an extended IV length and key mixing function and IEEE802.1x protocol used by providing port base security. To provide enhanced security of WLANs, IEEE 802.11i materialized a new MAC layer standard that eternally fixes most of the security problems found in temporary WLAN security solutions. WLANs are becoming more and more secure especially with the arrival of IEEE 802.11icompliant wireless hardware (a processor used in WLAN card and APs). Attacks on privacy, integrity and authentication can be conquered by IEEE 802.11i, is optionally sustaining TKIP to afford backward compatibility with inheritance systems and with systems that does not support AES hardware.
- November 2007