Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks

Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks

Kevin Curran, Elaine Smyth
Copyright: © 2005 |Volume: 1 |Issue: 3 |Pages: 25
ISSN: 1548-0631|EISSN: 1548-064X|ISSN: 1548-0631|EISBN13: 9781615201754|EISSN: 1548-064X|DOI: 10.4018/jbdcn.2005070104
Cite Article Cite Article

MLA

Curran, Kevin, and Elaine Smyth. "Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks." IJBDCN vol.1, no.3 2005: pp.59-83. http://doi.org/10.4018/jbdcn.2005070104

APA

Curran, K. & Smyth, E. (2005). Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks. International Journal of Business Data Communications and Networking (IJBDCN), 1(3), 59-83. http://doi.org/10.4018/jbdcn.2005070104

Chicago

Curran, Kevin, and Elaine Smyth. "Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks," International Journal of Business Data Communications and Networking (IJBDCN) 1, no.3: 59-83. http://doi.org/10.4018/jbdcn.2005070104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article highlights a number of security issues within wireless networks. Signal leakage for instance, means that network communications can be picked up outside the physical boundaries of the building in which they are being operated, meaning that a hacker can operate from the street outside or discretely from blocks away. In addition to signal leakage, the Wired Equivalent Privacy (WEP) protocol is inherently weak. There are also various other attacks that can be initiated against WLANs, all with detrimental effects. During our investigation, a war-driving expedition was conducted to ascertain the number of unprotected WLAN devices in use locally. We concluded that there was an apparent and serious lack of security on WLAN devices. Even those users that have implemented WEP do not seem to realize just how weak this protocol is or how their networks could be affected.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.