Security flaws in 802.11 data link protocols

  title={Security flaws in 802.11 data link protocols},
  author={Nancy Cam-Winget and Russ Housley and David A. Wagner and Jesse Walker},
  journal={Commun. ACM},
Understanding the difficulties in security protocol design and attempting to relocate the struggle between hacker and defender to a different protocol layer. 
Autonomic 802.11 wireless LAN security auditing
The authors describe their Distributed Wireless Security Auditor (DWSA), which works toward finding unauthorized wireless access points in large-scale wireless environments while providing anExpand
Exposing WPA2 security protocol vulnerabilities
The aim of this paper is to present a methodology that demonstrates how the WPA2 security protocol can be fully exposed by malicious attacks. Expand
Multi-Level Security for Wireless LAN
The advent of wireless LANs is a welcome sign in terms of ease of deployment and re-configuration. However, security is an alarming concern, as everything being transmitted is available "in the air.Expand
Practical WLAN security
This report covers the basics security standards in today’s wireless networks, how they work, existing flaws and vulnerability’s. We will go trough the basic architecture of 802.11, the security itExpand
New protocol design for wireless networks security
A number of measures are proposed to counter most of the known vulnerabilities that face the wireless networks security today, and can be used in a number of security related fields. Expand
Overview of WLAN security
Wireless networks are on the cutting edge of modern technology and are fast becoming ubiquitous. As a result increasing interest surrounding possible security problems has arisen. This paper offers aExpand
802.11 DCF Denial of Service Vulnerabilities
It is demonstrated that 802.11 wireless LANs are particularly vulnerable to denial of service attacks and should not be used where availability is essential. Expand
Wireless LANs – Convenience or Security
Wireless LANs have revolutionized the way in whic h people communicate and share information. The market for wireless applications and hardware is growing at a phenomenal rate. With wireless networksExpand
Enhanced WEP: An efficient solution to WEP threats
  • H. R. Hassan, Y. Challal
  • Computer Science
  • Second IFIP International Conference on Wireless and Optical Communications Networks, 2005. WOCN 2005.
  • 2005
This paper analyzes WEP security holes and proposes an improvement over WEP which achieves, in addition to its security goals, another security service which is replay detection. Expand


Security problems in 802.11-based networks
Assessing inherent wireless network security deficiencies and seeking solutions in the rapidly changing environment of wired and mobile networks. Expand
Intercepting mobile communications: the insecurity of 802.11
Several serious security flaws in the Wired Equivalent Privacy protocol are discovered, stemming from mis-application of cryptographic primitives, which lead to a number of practical attacks that demonstrate that WEP fails to achieve its security goals. Expand
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP
It is concluded that 802.11 WEP is totally insecure, and some recommendations are provided to make the attack more efficient. Expand
Unsafe at any key size; An analysis of the WEP encapsulation
It is infeasible to achieve privacy with the WEP encapsulation by simply increasing key size, and the characteristics needed by any encryption algorithm that can effectively provide data privacy in a wireless environment are identified, and a replacement encapsulation is recommended. Expand
Weaknesses in the Key Scheduling Algorithm of RC4
It is shown that RC4 is completely insecure in a common mode of operation which is used in the widely deployed Wired Equivalent Privacy protocol (WEP, which is part of the 802.11 standard), in which a fixed secret key is concatenated with known IV modifiers in order to encrypt different messages. Expand
Recommendation for Block Cipher Modes of Operation: Methods and Techniques
Abstract : This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebook (ECB), Cipher Block Chaining (CBC),Expand
An improved MIC for 802.11 WEP
  • IEEE
  • 2002
An Inductive Chosen Plaintext Attack Against WEP/WEP2
  • IEEE Document
  • 2001
Weaknesses in the key schedule algorithm of RC4
  • Proceedings of the 4th Annual Workshop on Selected Areas of Cryptography
  • 2001