09.11.2012 Views

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Borisov, Golberg and Wagner (2001) in their study mentioned that the inherent flaws in<br />

WEP protocol resulted from incorrectly using the RC4 stream cipher and also for<br />

choosing the CRC-32 as a data integrity algorithm thus renders WEP from providing the<br />

anticipated security goals. Agreeing to the mentioned WEP flaws, Stubblefield,<br />

Ioannidis and Rubin (2004) also added the specification <strong>of</strong> initialization vector (IV)<br />

selections, and the lack <strong>of</strong> key management as the main flaw <strong>of</strong> WEP protocol. In a<br />

high traffic WLAN environment, the usage <strong>of</strong> a relatively small IV would caused it to<br />

be repeated for more than once during a day which then makes it fairly easy for an<br />

attacker to evade the encryption process (Geier, 2002a; Woodward, 2005). Wi-Fi<br />

Alliance (2004) mentioned that an intruder or attacker with enough data can threaten a<br />

WEP protected network in three ways. The first way is by intercepting and decrypting<br />

the data while it is being transmitted. Secondly the network can be threatened by<br />

intruders modifying the data that is being communicated. Lastly, the intruder can<br />

deduced and forged the WEP key to gain unauthorized access to WLANs (Cam-Winget,<br />

Housley, Wagner, & Walker, 2003; Wi-Fi Alliance, 2004). Schafer (2003) explained<br />

that four other areas <strong>of</strong> security flaws in WEP which are the insufficiency <strong>of</strong> protection<br />

against messages that can be read by unauthorized users, the insecurity <strong>of</strong> data<br />

authentication and the lack <strong>of</strong> data integrity protection, the insufficient access control<br />

that validates user credentials, and finally the weakness <strong>of</strong> using key computation that is<br />

based on eavesdropped messages (Schafer, 2003). Despite all the flaws present it WEP<br />

protocol, WEP still provides a minimum level <strong>of</strong> security to WLAN (Geier, 2002a) and<br />

will discourage amateur attackers.<br />

Another important security measure, WPA or Wi-Fi protected access addresses all<br />

known security issues <strong>of</strong> WEP therefore enhanced wireless security. WPA is not only<br />

providing stronger data encryption than WEP, it also added user authentication to the<br />

process (Loeb, 2005). WPA is developed to provide security to all versions <strong>of</strong> 802.11<br />

devices which includes 802.11a, 802.11b, and 802.11g. WPA is both forward and<br />

backward-compatible with all 802.11 standard and is designed to run on the current<br />

available wireless devices as a s<strong>of</strong>tware download (McCullough, 2004). WPA employs<br />

the 802.1X authentication, the extensible authentication protocol (EAP), and uses the<br />

temporal key integrity protocol (TKIP) for encryption (Wi-Fi Alliance, 2004). There<br />

are many security advantages <strong>of</strong> implementing WPA as compared to the WEP protocol.<br />

The first advantage <strong>of</strong> WPA is the mutual authentication mechanism which provides a<br />

much stronger network access control than WEP. Secondly, WPA protocol supports<br />

13

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!