09.11.2012 Views

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

node is expected to decrypt the challenge packet using the shared WEP protocol and<br />

send the encrypted file back to the AP. If the encrypted file is correct then the wireless<br />

node will be authenticated (Arbaugh, Shankar, & Wan, 2001; Chen, Jiang, & Liu, 2005;<br />

Schafer, 2003). To ensure mutual authentication the requestor and the authenticator<br />

will switch roles and repeat the process mentioned previously before the node is finally<br />

associated with the AP (Arbaugh, Shankar, & Wan, 2001). Though the shared key<br />

authentication seemed more secured than the open system authentication, Schafer<br />

(2003) argued that the process still provide no security to the identity <strong>of</strong> the requestor<br />

since the authentication data is still sent back and fro is clear text. The third<br />

authentication message can be easily eavesdropped by attackers due to the weaknesses<br />

<strong>of</strong> WEP protocol that is used in the process (Schafer, 2003). Figure 2.3 illustrates the<br />

shared key authentication process.<br />

Figure 2.3 802.11 Shared key authentication (Netgear Inc, 2005b)<br />

2.4.2 Encryption and Data Confidentiality<br />

The implementation <strong>of</strong> encryption in WLANs is to ensure a security method that can<br />

provide both data integrity and privacy. The security method must ensure that all<br />

transmitted packets do originate from a real sender and that the data have not been<br />

decrypted while intransient by any unauthorized means. This security method must<br />

always impose the integrity <strong>of</strong> data at any given circumstances (S. Wong, 2003). In<br />

order to protect the confidentiality and integrity <strong>of</strong> data transmitted in WLANs, several<br />

techniques have been developed such as service set identifier (SSID), wired equivalent<br />

privacy (WEP), and also Wi-Fi protected access (WPA).<br />

11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!