Rollover to Zoom 



In the IEEE 802.11 standard an optional encryption protocol called Wired Equivalency Privacy (WEP) is used to make wireless traffic as secure as wired network traffic. However it has been found that WEP suffers several weaknesses like a shared key weakness, no per-packet authentication, vulnerability to disassociation attacks, no user identification and authentication, no central authentication, authorization, and accounting support and vulnerability of RC4 to known plaintext attacks. To address these concerns, The Temporal Key Integrity Protocol (TKIP) was created to fix the weaknesses of Wired Equivalent Privacy (WEP). Wireless security is an exciting field of study, and we aim to find more weaknesses and new application areas of the attacks on TKIP. We hope that our work may contribute to motivate people to migrate their wireless security protocols to the more secure alternative CCMP.
  • ISBN13: 9783659132537
  • Publisher: LAP Lambert Academic Publishing
  • Pubilcation Year: 2012
  • Format: Paperback
  • Pages: 00108
Publication DateMay 27, 2012
Primary CategoryComputers/Networking - General

Performance Evaluation of Security Algorithms in a Wi-Fi Testbed

Write a Review

Free Shipping over $35 and Free Returns 

$0.34 off if you opt out of free returns