Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks

Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks

Kevin Curran, Elaine Smyth
DOI: 10.4018/jbdcn.2005070104
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This article highlights a number of security issues within wireless networks. Signal leakage for instance, means that network communications can be picked up outside the physical boundaries of the building in which they are being operated, meaning that a hacker can operate from the street outside or discretely from blocks away. In addition to signal leakage, the Wired Equivalent Privacy (WEP) protocol is inherently weak. There are also various other attacks that can be initiated against WLANs, all with detrimental effects. During our investigation, a war-driving expedition was conducted to ascertain the number of unprotected WLAN devices in use locally. We concluded that there was an apparent and serious lack of security on WLAN devices. Even those users that have implemented WEP do not seem to realize just how weak this protocol is or how their networks could be affected.

Complete Article List

Search this Journal:
Reset
Volume 20: 1 Issue (2025): Forthcoming, Available for Pre-Order
Volume 19: 1 Issue (2024)
Volume 18: 2 Issues (2022): 1 Released, 1 Forthcoming
Volume 17: 2 Issues (2021)
Volume 16: 2 Issues (2020)
Volume 15: 2 Issues (2019)
Volume 14: 2 Issues (2018)
Volume 13: 2 Issues (2017)
Volume 12: 2 Issues (2016)
Volume 11: 2 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing