Preview

Wi-Fi Protection with Wi-Fi P+

Powerful Essays
Open Document
Open Document
2127 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wi-Fi Protection with Wi-Fi P+
Wi-Fi Security with Wi-Fi
Protection
Plus
Ajin Abraham, Joseph Sebastian
Vimal Jyothi Engineering College.

After conducting a study and analysis of the vulnerabilities of current Wi Fi Security industrial standards, we consider the possibility a new security architecture for
Wi Fi which we call Wi Fi P+. Wi-Fi P+ is not a complex security architecture. It act as an additional security layer implemented over
WPA/WPA2. It also implements some already available features that are not built in with WPA/WPA2.

Vulnerabilities in
Current Wi-Fi Security
Standards
The current Wi-Fi Security standards are




Abstract
Current Industrial standards of Wi-Fi security are found to have security loop holes, making it possible for hackers to break it. So we consider the possibility of a new technology for Wi-Fi security. We call it
Wi-Fi P+ or Wireless Fidelity Protection Plus

Introduction
Wi-Fi is common nowadays. Every educational institutions and business organizations has got their perimeter covered in Wi-Fi. All the confidential data being transmitted through Wi-Fi, makes it a target for Hackers. To secure it, some Wi-Fi security standards like WEP, WPA, and
WPA2 are introduced. Each of them is introduced when the previous security architecture was found to be a failure. But in present situation all of these industrial standard Wi Fi security architectures are found to have vulnerabilities so that a hacker can hack into the Wi Fi network.

WEP – Wired Equivalent Privacy
WPA– Wi-Fi Protected Access
WPA2 – Wi-Fi Protected Access 2

Vulnerabilities in WEP
WEP (Wired Equivalent Privacy) is based on the RC4 encryption algorithm, with a secret key of 40 bits or 104 bits being combined with a 24-bit Initialization Vector (IV) to encrypt the plaintext message M and its checksum – the ICV (Integrity Check Value).
The encrypted message C was therefore determined using the following formula:
C = [ M || ICV(M) ] + [



References: wireless hacking tool. April 8, 2004.

You May Also Find These Documents Helpful

  • Better Essays

    For this week’s lab we are using various scenarios to compare and contrast different antenna types and solutions to reduce signal spillover in a specific wireless network. Also we are evaluating and comparing the different possible security methods that could be implemented in a wireless network and listed the advantages and disadvantages of each network. And also looking into possible methods for locating a rogue access point, with the goal of getting a better understanding of not only troubleshooting issues but learning some methods for securing the network also.…

    • 1620 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 4 Assignment

    • 1851 Words
    • 8 Pages

    RESEARCH MAN-IN-THE MIDDLE ATTACKS IN ETHERNET WIFI. DESCRIBE HOW THEY ARE IMPLEMENTED AND HOW THEY CAN BE PREVENTED.…

    • 1851 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    In the WAN domain, enforce encryption, and VPN tunneling for remote connections. Configure routers, and network firewalls to block Ping requests to reduce chance of Denial of Service attacks. Deployment of…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3230 Lab 4

    • 528 Words
    • 2 Pages

    8. WEP's major weakness is its use of static encryption keys. When you set up a router with a WEP encryption key, that one key is used by every device on your network to encrypt every packet that's transmitted. But the fact that packets are encrypted doesn't…

    • 528 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Everyone wants privacy in their life and they often secure their things from others but what about your WIFI connection?…

    • 367 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    This MLS plan will give a brief overview of the security strategies that will be implemented at each level of the IT infrastructure.…

    • 506 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    CLI commands that are used in a switch and in a router are the same. Most CLI commands are configured in the global configuration mode. It’s always good practice to start with the command erase…

    • 1491 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    Hot spot patrol suggests that there are high levels of crime in a small area (communities or neighborhoods) within a larger environment such as a city. It is safe to say that almost every major city has these hot spots. Hot spots policing covers wide range of police tactics that concentrate resources on the problem locations where crime is a major problem and they also focus on the targets that is causes the problems. If there is an area with heavy drug sales and usage there is a great chance that robberies will be a common problem. Drug users that have little to no money will attempt to support their addition by any means necessary. This could also bring about drive-by shooting as drug dealer’s fight over territory. One way to…

    • 198 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Network Hardening

    • 287 Words
    • 2 Pages

    It is very important to go through the process of hardening. Hardening is where you change the hardware and software configurations to make computers and devices as secure as possible. I picked the network layout 1-the workgroup . First with the workstations and laptops you need to shut down the unneeded services or programs or even uninstall them. I would also have some good anti-virus software on the workstations. You also need a hardened image for all of your workstations. To do this you need to install a new copy of the operating system and then harden it. After you have one good hardened workstation you can use it as a model for all other workstations and also laptops. For the router you definitely need to protect it from unauthorized access. The router needs to be password protected and you should periodically change that password. For the cable modem you should keep all unwanted ports closed. I would also schedule a regular scan of all the systems. Now for some of these next things I am talking about they will apply to all devices . Disable remote administration. Administration of your router / access point should be "local only", namely, there is no reason to let people from another country access to your network hardware. If you need to make changes, you should be local to the device. Update the firmware. Believe it or not, consumer network hardware needs to be patched also. Check the support site of the vendor of the device when you get it and check for an update. Sign up for e-mail alerts for updates, if available, or check back on a regular basis for…

    • 287 Words
    • 2 Pages
    Good Essays
  • Better Essays

    "Overcoming" these problems come at a high cost. Methods to deal with these problems lead to slower transmission speeds and extra overhead costs for error reduction. Fortunately, work has been done by Hills and his colleagues towards improving the Wi-Fi technology in "the areas of reliability, performance, design and security." The improvements gave rise to a second generation of Wi-Fi technology, called "Smart Wi-Fi" by the author. The author then addresses four ways that Smart Wi-Fi improves on its…

    • 925 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    wificrack

    • 2263 Words
    • 9 Pages

    Follow the steps below… download wep password cracker software AIRCRACK. then, step 1: extract it on desktop, step 2: open up BIN folder, step 3: Now,open AIRCRACK-NG GUI step 4: step 5: step 6: step 7: That all... Any problem then coment me... Email extractor spider gold :: 2005-08-12 :: 30 EMail Extractor v3.2.1 :: 2007-09-26 :: 42 Email for NET 2.0 :: 2005-08-12 :: 36 Email Generator by Emailsmartz :: 2010-06-04 :: 22 Email hacker v3.4.6 :: 2014-03-14 :: 22 Email Manager by Emailsmartz :: 2010-06-04 :: 25 Email Marketer Business Edition v1.42 Multilingual :: 2006-09-01 :: 15 Email Marketing Director v4.1.117 :: 2007-11-24 :: 34…

    • 2263 Words
    • 9 Pages
    Satisfactory Essays
  • Good Essays

    In the article" From Stone Age To Phone Age ", author Barbara Ehrereich argues that all cell phones serve as a status symbol, thus presenting mankind 's selfish attempt to "showboat" their level of importance. By publicly engaging in meaningless conversations individuals are able to obtain admirer 's jealously; thus portraying that the on-lookers are lonely because of their absence of a cellular phone or lack of received calls. In fact since primal times it has been a tendency of humans to compete with one another over similar status symbols from "shrunken-heads" to the best place of residence. Cell phones are both misused and overused instead of serving its original purpose for emergencies it is used to gossip, take pictures and compete with others; because of this cell phone usage should be restricted in certain areas.…

    • 881 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Gsm Network Jammer

    • 3675 Words
    • 15 Pages

    jammer. This jammer works at GSM 900 and GSM 1800 simultaneously and thus jams the…

    • 3675 Words
    • 15 Pages
    Powerful Essays
  • Satisfactory Essays

    Cisco Wireless Compliance

    • 6685 Words
    • 27 Pages

    Country North America Canada Mexico U.S. EMEA Algeria Austria Bahrain Belarus Belgium -E -E -E -I -E X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X Importer must obtain approvals Importer must obtain approvals -A -N -A X X X X X X X X X X X X X X X X X X X X X Indoor use only from 5150-5250 MHz…

    • 6685 Words
    • 27 Pages
    Satisfactory Essays
  • Powerful Essays

    Hybrid Network Security

    • 10587 Words
    • 43 Pages

    AYAN ROY-CHOWDHURY, JOHN S. BARAS, MICHAEL HADJITHEODOSIOU, AND SPYRO PAPADEMETRIOU, UNIVERSITY OF MARYLAND AT COLLEGE PARK…

    • 10587 Words
    • 43 Pages
    Powerful Essays