Protection
Plus
Ajin Abraham, Joseph Sebastian
Vimal Jyothi Engineering College.
After conducting a study and analysis of the vulnerabilities of current Wi Fi Security industrial standards, we consider the possibility a new security architecture for
Wi Fi which we call Wi Fi P+. Wi-Fi P+ is not a complex security architecture. It act as an additional security layer implemented over
WPA/WPA2. It also implements some already available features that are not built in with WPA/WPA2.
Vulnerabilities in
Current Wi-Fi Security
Standards
The current Wi-Fi Security standards are
Abstract
Current Industrial standards of Wi-Fi security are found to have security loop holes, making it possible for hackers to break it. So we consider the possibility of a new technology for Wi-Fi security. We call it
Wi-Fi P+ or Wireless Fidelity Protection Plus
Introduction
Wi-Fi is common nowadays. Every educational institutions and business organizations has got their perimeter covered in Wi-Fi. All the confidential data being transmitted through Wi-Fi, makes it a target for Hackers. To secure it, some Wi-Fi security standards like WEP, WPA, and
WPA2 are introduced. Each of them is introduced when the previous security architecture was found to be a failure. But in present situation all of these industrial standard Wi Fi security architectures are found to have vulnerabilities so that a hacker can hack into the Wi Fi network.
WEP – Wired Equivalent Privacy
WPA– Wi-Fi Protected Access
WPA2 – Wi-Fi Protected Access 2
Vulnerabilities in WEP
WEP (Wired Equivalent Privacy) is based on the RC4 encryption algorithm, with a secret key of 40 bits or 104 bits being combined with a 24-bit Initialization Vector (IV) to encrypt the plaintext message M and its checksum – the ICV (Integrity Check Value).
The encrypted message C was therefore determined using the following formula:
C = [ M || ICV(M) ] + [
References: wireless hacking tool. April 8, 2004.