Security Mechanism Analysis of Wireless Local Area Network Based on WEP Protocol
Due to the high rate, flexible of WLAN technology, it is easy to install, expand and economical advantages, which can meet virtually business or internet application needs. However, wireless network security problems in the process of rapid application brought in more and more people's attentio...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
AIDIC Servizi S.r.l.
2016-08-01
|
Series: | Chemical Engineering Transactions |
Online Access: | https://www.cetjournal.it/index.php/cet/article/view/3990 |
_version_ | 1818408899140648960 |
---|---|
author | Z.H. Cao D.X. Yu Q.T. Wu |
author_facet | Z.H. Cao D.X. Yu Q.T. Wu |
author_sort | Z.H. Cao |
collection | DOAJ |
description | Due to the high rate, flexible of WLAN technology, it is easy to install, expand and economical advantages, which can meet virtually business or internet application needs. However, wireless network security problems in the process of rapid application brought in more and more people's attention. This paper introduces the concept and 802.11 WLAN security standards from the generation algorithm based --RC4 WEP security mechanism to explain the principles of the WEP security mechanism and processing. The decryption process was for analyzing the shortcomings of WEP security mechanism and vulnerabilities, the current attacks against WEP and intrusion methods. Finally, two improved methods TKIP protocol improvements and AES_CCM improved system for a detailed description. Security issues will continue to be the biggest obstacle to the wireless LAN industry. |
first_indexed | 2024-12-14T09:51:03Z |
format | Article |
id | doaj.art-53ed375bda384b78b88d2c95f6d899c2 |
institution | Directory Open Access Journal |
issn | 2283-9216 |
language | English |
last_indexed | 2024-12-14T09:51:03Z |
publishDate | 2016-08-01 |
publisher | AIDIC Servizi S.r.l. |
record_format | Article |
series | Chemical Engineering Transactions |
spelling | doaj.art-53ed375bda384b78b88d2c95f6d899c22022-12-21T23:07:31ZengAIDIC Servizi S.r.l.Chemical Engineering Transactions2283-92162016-08-015110.3303/CET1651126Security Mechanism Analysis of Wireless Local Area Network Based on WEP ProtocolZ.H. CaoD.X. YuQ.T. WuDue to the high rate, flexible of WLAN technology, it is easy to install, expand and economical advantages, which can meet virtually business or internet application needs. However, wireless network security problems in the process of rapid application brought in more and more people's attention. This paper introduces the concept and 802.11 WLAN security standards from the generation algorithm based --RC4 WEP security mechanism to explain the principles of the WEP security mechanism and processing. The decryption process was for analyzing the shortcomings of WEP security mechanism and vulnerabilities, the current attacks against WEP and intrusion methods. Finally, two improved methods TKIP protocol improvements and AES_CCM improved system for a detailed description. Security issues will continue to be the biggest obstacle to the wireless LAN industry.https://www.cetjournal.it/index.php/cet/article/view/3990 |
spellingShingle | Z.H. Cao D.X. Yu Q.T. Wu Security Mechanism Analysis of Wireless Local Area Network Based on WEP Protocol Chemical Engineering Transactions |
title | Security Mechanism Analysis of Wireless Local Area Network Based on WEP Protocol |
title_full | Security Mechanism Analysis of Wireless Local Area Network Based on WEP Protocol |
title_fullStr | Security Mechanism Analysis of Wireless Local Area Network Based on WEP Protocol |
title_full_unstemmed | Security Mechanism Analysis of Wireless Local Area Network Based on WEP Protocol |
title_short | Security Mechanism Analysis of Wireless Local Area Network Based on WEP Protocol |
title_sort | security mechanism analysis of wireless local area network based on wep protocol |
url | https://www.cetjournal.it/index.php/cet/article/view/3990 |
work_keys_str_mv | AT zhcao securitymechanismanalysisofwirelesslocalareanetworkbasedonwepprotocol AT dxyu securitymechanismanalysisofwirelesslocalareanetworkbasedonwepprotocol AT qtwu securitymechanismanalysisofwirelesslocalareanetworkbasedonwepprotocol |