Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks

Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks

Kevin Curran (University of Ulster at Magee, UK) and Elaine Smyth (University of Ulster at Magee, UK)
DOI: 10.4018/jbdcn.2005070104
OnDemand PDF Download:
$37.50

Abstract

This article highlights a number of security issues within wireless networks. Signal leakage for instance, means that network communications can be picked up outside the physical boundaries of the building in which they are being operated, meaning that a hacker can operate from the street outside or discretely from blocks away. In addition to signal leakage, the Wired Equivalent Privacy (WEP) protocol is inherently weak. There are also various other attacks that can be initiated against WLANs, all with detrimental effects. During our investigation, a war-driving expedition was conducted to ascertain the number of unprotected WLAN devices in use locally. We concluded that there was an apparent and serious lack of security on WLAN devices. Even those users that have implemented WEP do not seem to realize just how weak this protocol is or how their networks could be affected.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 13: 2 Issues (2017): Forthcoming, Available for Pre-Order
Volume 12: 2 Issues (2016)
Volume 11: 2 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing