A novel scrambling algorithm for a robust WEP implementation [wired equivalent privacy protocol]

M Jagetia, T Kocak

Research output: Contribution to journalArticle (Academic Journal)peer-review

220 Downloads (Pure)

Abstract

Internet enabled wireless devices continue to proliferate and are expected to surpass traditional Internet in the near future. However, data security and privacy remain major concerns in the current generation of wireless connectivity. The wired equivalent privacy (WEP) protocol used within the 802.11 standard has "major security flaws" thus WLANs using the protocol are vulnerable to attacks. We propose a scrambling algorithm that reduces the vulnerability of the WEP. Both the software and hardware implementations of the algorithm reveal at least 10,000 times improvement in security
Translated title of the contributionA novel scrambling algorithm for a robust WEP implementation
Original languageEnglish
Pages (from-to)2487 - 2491
Number of pages5
JournalIEEE 59th Vehicular Technology Conference, 2004 (VTC 2004-Spring)
Volume5
DOIs
Publication statusPublished - May 2004
Event59th Vehicular Technology Conference 2004 (VTC 2004-Spring) - Milan, Italy
Duration: 1 May 2004 → …

Bibliographical note

Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Name and Venue of Conference: IEEE 59th Vehicular Technology Conference, Milan, Italy
Conference Organiser: IEEE
Rose publication type: Conference contribution

Terms of use: Copyright © 2004 IEEE. Reprinted from IEEE 59th Vehicular Technology Conference, 2004. (VTC-Spring 2004).

This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Bristol's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org.

By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

Keywords

  • wireless LAN
  • 802.11
  • security
  • WEP

Fingerprint Dive into the research topics of 'A novel scrambling algorithm for a robust WEP implementation [wired equivalent privacy protocol]'. Together they form a unique fingerprint.

Cite this