SlideShare a Scribd company logo
K. Prasuna et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.146-148

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Secure Level Transmission in Wi-Fi Using Cryptography
K. Prasuna1, M. Padmaja2
1
2

Asst.Professor, Vijaya Institute of Technology for Women, Enikepadu, INDIA.
Associate Professor,VR Siddhartha College of Engineering, INDIA

Abstract
Wi-Fi, is a mechanism that allows electronic devices to exchange data wirelessly over a computer network WiFi suggests Wireless Fidelity, resembling the long-established audio-equipment classification term Hi-Fi or
High Fidelity.This paper first gives some background information about WiFi system and security issues in ad
hoc networks, then it concentrates on the specific security measures like hybrid encryption techniques using
both AES and RSA algorithms and also the different standards. To provide the security for the data transmitted
through WiFi ,it uses WEP algorithm,WEP64 and WEP128 and then it moves to WPA (Wi-Fi Protected
Access) as the key is short in WEP.WPA use the TKIP and depends on RC4,which consist of 128 bit and 48 bit.
The security comparisons show that WPA and TPIK is more advantageous than WEP and hence it is more
preferable.
Keywords-Wi-Fi, WEP, WPA, TPIK

I.

INTRODUCTION

Wi-Fi is a wireless technology that uses
radio frequency to transmit data through the air. In
Short called wireless fidelity and is meant to be used
generically when referring to any type of 802.11
network, whether 802.11b, 802.11a, 802.11g, dualband, etc.The 802.11 standard reserves the low levels
of the OSI model for a wireless connection that uses
electromagnetic waves.The physical layer , which
offers three types of information encoding. The data
link layer, comprised of two sub-layers:
Logical Link Control (or LLC) and Media
Access Control (or MAC). The physical layer defines
the radio wave modulation and signaling
characteristics for data transmission, while the data
link layer defines the interface between the machine's
bus and the physical layer, in particular an access
method close to the one used in the Ethernet standard
and rules for communication between the stations of
the network. The 802.11 standard actually has three
physical layers, which define alternative modes of
transmission:
Data Link Layer
Physical Layer
802.2
DSSS
802.11
FHSS,Infrared

II.

THE VARIOUS WI-FI STANDARDS

The IEEE 802.11 standard is actually only
the earliest standard, allowing 1-2 Mbps of
bandwidth. Amendments have be made to the original
standard in order to optimise bandwidth (these
include the 802.11a, 802.11b and 802.11g standards,
which are called 802.11 physical standards) or to
better specify components in order to ensure
improved security or compatibility. the various

www.ijera.com

amendments to the 802.11 standard and their
significance are given as
802.11a-Wifi5 :The 802.11a standard (called WiFi
5) allows higher bandwidth (54 Mbps maximum
throughput, 30 Mbps in practice). The 802.11a
standard provides 8 radio channels in the 5 GHz
frequency band.
802.11b-WiFi:The 802.11b standard is currently the
most widely used one. It offers a maximum
thoroughput of 11 Mbps (6 Mbps in practice) and a
reach of up to 300 metres in an open environment. It
uses the 2.4 GHz frequency range, with 3 radio
channels available.
802.11c-Bridging 802.11 and 802.1d:The 802.11c
bridging standard is of no interest to the general
public. It is only an amended version of the 802.1d
standard that lets 802.1d bridge with 802.11compatible devices (on the data link level).
802.11d-Internationalisation:The 802.11d standard
is a supplement to the 802.11 standard which is meant
to allow international use of local 802.11 networks. It
lets different devices trade information on frequency
ranges depending on what is permitted in the country
where the device is from.
802.11e-Improving service quality:The 802.11e
standard is meant to improve the quality of service at
the level of the data link layer. The standard's goal is
to define the requirements of different packets in
terms of bandwidth and transmission delay so as to
allow better transmission of voice and video.
802.11f-Roaming:The 802.11f is a recommendation
for access point vendors that allows products to be
more compatible. It uses the Inter-Access Point
Roaming Protocol, which lets a roaming user
transparently switch from one access point to another
while moving around, no matter what brands of

146 | P a g e
K. Prasuna et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.146-148
access points are used on the network infrastructure.
This ability is also simply called roaming.
802.11g:The 802.11g standard offers high bandwidth
(54 Mbps maximum throughput, 30 Mbps in practice)
on the 2.4 GHz frequency range. The 802.11g
standard is backwards-compatible with the 802.11b
standard, meaning that devices that support the
802.11g standard can also work with 802.11b.
802.11h:The 802.11h standard is intended to bring
together the 802.11 standard and the European
standard (HiperLAN 2, hence the h in 802.11h) while
conforming to European regulations related to
frequency use and energy efficiency.
802.11i:The 802.11i standard is meant to improve the
security of data transfers (by managing and
distributing keys, and implementing encryption and
authentication). This standard is based on the AES
(Advanced Encryption Standard) and can encrypt
transmissions that run on 802.11a, 802.11b and
802.11g technologies.
802.11Ir:The 802.11r stadard has been elaborated so
that it may use infra-red signals. This standard has
become technologically obsolete.
802.11j:The 802.11j standard is to Japanese
regulation what the 802.11h is to European
regulation.
The 802.11a, 802.11b and 802.11g standards, called
"physical standards" are amendments to the 802.11
standard and offer different modes of operation,
which lets them reach different data transfer speeds.

III.

WEP

WEP known as Wired Equivalent
Privacy.The main goal of WEP is to make Wi-Fi
network at least as secure as wired LANand to encrpt
data transmitted to prevent the attackers from getting
the information.WEP offers services such as message
confidentiality,message integrity and authencity and
access control to the network.
WEP uses encryption algorithm called
RC4.The key divided into two parts:IV(InitialVector)
of 24 bits and Secret key of 40 bitsor 104 bits.There
are two kinds of WEP-WEP64(40bit+24bit) and WEP
128(104bit+24bit).
This key is all-important to WEP in that it is
also used in the encryption process to uniquely
scramble each packet of information with a unique
password. This ensures that if a hacker cracks one
packets key,he won’t be able to view every packet’s
information.WEP defines a method to create a unique
secret key for each packet using the 5- or 13characters of the pre-shared key and three more
psuedo-randomly selected characters picked by the
wireless hardware.
RC4 Algorithm
RC4 is the encryption algorithm used to
cipher the data sent over the airwaves. It is important
that data is scrambled; otherwise, anyone could “see”
everything using a sniffer. This includes all e-mails,
www.ijera.com

www.ijera.com

Web pages, documents, and more. RC4 is a very
simple and fast method of encryption that scrambles
each and every byte of data sent in a packet.It does
this through a series of equations using the previously
discussed secret key.RC4 actually consists of two
parts: the Key Scheduling Algorithm and the Psuedo
Random Generation Algorithm. Each part is
responsible for a different part of the encryption
process.
KSA (Key Scheduling Algorithm)
The Key Scheduling Algorithm is the first
part of the encryption process. The following is
the algorithm actually used in RC4.
1. Assume N = 256
2. K[] = Secrete Key array
3. Initialization:
4. For i = 0 to N – 1
5. S[i] = i
6. j = 0
7. Scrambling:
8. For i = 0 ... N – 1
9. j = j + S[i] + K[i]
10. Swap(S[i], S[j])
PRGA
The PRGA (Psuedo Random Generation
Algorithm) is the part of the RC4 process that outputs
a streaming key based on the KSA’s psuedo random
state array. This streaming key is then merged with
the plaintext data to create a stream of data that is
encrypted.
1. Initialization:
2. i = 0
3. j = 0
4. Generation Loop:
5. i = i + 1
6. j = j + S[i]
7. Swap(S[i], S[j])
8. Output z = S[S[i] + S[j]]
9. Output XORed with data
The reason of transition to WPA.The same IV can be
used more than once.The secret key is common in
WEP.The key that WEP uses is short.Most users
usually do not change their keys.
WPA:WPA known as Wi-Fi Protected Access.WPA
use the TKIP and depends on RC4.The key in WPA
consist of 128 bit and 48 bit for initial vector
TKIP:TKIP is a security protocol used in the IEEE
802.11 wireless networking standard.TKIP was a
solution to replace WEP without requiring the
replacement of legacy hardware..TKIP implement
three new security features.TKIP implements a key
mixing function.WPA implements a sequence counter
to protect against replay attacks.Finally ,TKIP
implements a 64-bit message integrity check named
MICHAEL

147 | P a g e
K. Prasuna et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.146-148

Encryption
Key rotation

Key
distribution

WEP
RC4
None

Manually
typed
into each
device

IV.

WPA
RC4
Dynamic
sessionke
ys
Automati
c
distributi
on

WPA2
AES
Dynamic
sessionkeys
Automatic
distribution

CONCLUSIONS

[8]

[9]

[10]

[11]

www.ijera.com

Vebjørn Moen, H°avard Raddum, Kjell J.
Hole, “Weaknesses in theTemporal Key
Hash of WPA”, University of Bergen,2005
Arunesh Mishra, William, A. Arbaugh, “An
Initial Security Analysisof the IEEE 802.1X
Standard”, University of Meryland, 2002
Vebjørn Moen, H°avard Raddum, Kjell J.
Hole; “Weaknesses in theTemporal Key
Hash of WPA”; Mobile Computing
andCommunications Review, 2005
John L. MacMichael; “Auditing Wi-Fi
Protected Access (WPA)Pre-Shared Key
Mode”; Linux Journal, 2005.

As discussed above, security is not one time
job. Security is constant vigilance against threats and
attacks. We cannot eliminate hackers, pirates, thieves,
etc. from the face of the earth. WPA (Wi-Fi
Protected Access) is the next generation of wireless
encryption technologies. It’s far more secure and
easier to configure than WEP. Almost all network
devices support this. WPA replaces WEP with an
improved encryption algorithm called Temporal Key
Integrity Protocol (TKIP). TKIP supplies each client
with a unique key and uses much longer keys that are
rotated at a configurable interval. WPA also includes
an encrypted message integrity check field in the
packet to prevent denial-of-service and spoofing
attacks, something that neither static for security. It
can be used in Personal or Enterprise modes and has
so far proven difficult to attack. It is recommended to
use WPA or WPA2 encryption.

REFERENCES
[1]

[2]

[3]

[4]

[5]

[6]

[7]

Arash Habibi Lashkari, F. Towhidi, R. S.
Hoseini, “Wired EquivalentPrivacy(WEP)”,
ICFCC
Kuala
Lumpur
Conference,
Published byIEEE Computer Society,
Indexed by THAMSON ISI, 2009
Donggang Liu, P. N., “Security for Wireless
Sensor Networks”,Springer., November,
2006
Garcia, R. H. a. M., “AN ANALYSIS OF
WIRELESS SECURITY”,CCSC: South
Central Conference. 2006
Kempf, J., “Wireless Internet Security:
Architecture and Protocols“,Cambridge
University Press. October, 2008
Hani Ragab Hassan, Yacine Challal,
“Enhanced WEP: An efficientsolution to
WEP threats”, IEEE 2005
Halil Ibrahim BULBUL, Ihsan BATMAZ,
Mesut OZEL,“Comparison of WEP (Wired
Equivalent Privacy) Mechanism, WPA(WiFi Protected Access) and RSN (Robust
Security Network)Security Protocols”; eForensics January 2008, Adelaide ,Australia.
Gamal Selim, Hesham M. El Badawy,
Mohamed Abdul Salam,“NEW PROTOCOL
DESIGN
FOR
WIRELESS
NETWORKSSECURITY”, IEEE Explore

www.ijera.com

148 | P a g e

More Related Content

What's hot

Wireless network security
Wireless network securityWireless network security
Wireless network security
Vishal Agarwal
 
A SURVEY OF THE S TATE OF THE A RT IN Z IG B EE
A  SURVEY OF THE  S TATE OF THE  A RT IN  Z IG B EEA  SURVEY OF THE  S TATE OF THE  A RT IN  Z IG B EE
A SURVEY OF THE S TATE OF THE A RT IN Z IG B EE
IJCI JOURNAL
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
Syed Ubaid Ali Jafri
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
Nil Menon
 
Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4Alexander Decker
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
Virendra Thakur
 
Wireless Security
Wireless SecurityWireless Security
Sustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication StackSustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication Stack
IJERA Editor
 
IoT Connectivity
IoT Connectivity IoT Connectivity
IoT Connectivity
Hitesh Mohapatra
 
Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measure
Shivam Singh
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
Sreekanth GS
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
guestd7b627
 
OVERVIEW OF PKM AUTHENTICATION MECHANISM IN WiMAX SECURITY PROTOCOL
OVERVIEW OF PKM AUTHENTICATION MECHANISM IN WiMAX SECURITY PROTOCOLOVERVIEW OF PKM AUTHENTICATION MECHANISM IN WiMAX SECURITY PROTOCOL
OVERVIEW OF PKM AUTHENTICATION MECHANISM IN WiMAX SECURITY PROTOCOL
Zachariah Pabi
 
Go3611771182
Go3611771182Go3611771182
Go3611771182
IJERA Editor
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing NetworksDsunte Wilson
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
UBT - Higher Education Institution
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
Muhammad Zia
 
Secure Data Transmission
Secure Data TransmissionSecure Data Transmission
Secure Data Transmission
bjp4642
 

What's hot (19)

Wireless network security
Wireless network securityWireless network security
Wireless network security
 
A SURVEY OF THE S TATE OF THE A RT IN Z IG B EE
A  SURVEY OF THE  S TATE OF THE  A RT IN  Z IG B EEA  SURVEY OF THE  S TATE OF THE  A RT IN  Z IG B EE
A SURVEY OF THE S TATE OF THE A RT IN Z IG B EE
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
WPA2
WPA2WPA2
WPA2
 
Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Sustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication StackSustainable Lightweight Wireless Communication Stack
Sustainable Lightweight Wireless Communication Stack
 
IoT Connectivity
IoT Connectivity IoT Connectivity
IoT Connectivity
 
Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measure
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
OVERVIEW OF PKM AUTHENTICATION MECHANISM IN WiMAX SECURITY PROTOCOL
OVERVIEW OF PKM AUTHENTICATION MECHANISM IN WiMAX SECURITY PROTOCOLOVERVIEW OF PKM AUTHENTICATION MECHANISM IN WiMAX SECURITY PROTOCOL
OVERVIEW OF PKM AUTHENTICATION MECHANISM IN WiMAX SECURITY PROTOCOL
 
Go3611771182
Go3611771182Go3611771182
Go3611771182
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Secure Data Transmission
Secure Data TransmissionSecure Data Transmission
Secure Data Transmission
 

Viewers also liked

V36130135
V36130135V36130135
V36130135
IJERA Editor
 
R36100108
R36100108R36100108
R36100108
IJERA Editor
 
P368995
P368995P368995
P368995
IJERA Editor
 
L367174
L367174L367174
L367174
IJERA Editor
 
K366470
K366470K366470
K366470
IJERA Editor
 
O368588
O368588O368588
O368588
IJERA Editor
 
N367984
N367984N367984
N367984
IJERA Editor
 
X36141145
X36141145X36141145
X36141145
IJERA Editor
 
W36136140
W36136140W36136140
W36136140
IJERA Editor
 
S36109115
S36109115S36109115
S36109115
IJERA Editor
 
U36123129
U36123129U36123129
U36123129
IJERA Editor
 
Q369699
Q369699Q369699
Q369699
IJERA Editor
 
Սասունցի Դավիթ
Սասունցի ԴավիթՍասունցի Դավիթ
Սասունցի ԴավիթDavid Melkonyan
 
Intervención, final
Intervención, final Intervención, final
Intervención, final Deniz Reyes
 
Practica 6 complementos del diseños de un docuemento
Practica 6 complementos del diseños de un docuementoPractica 6 complementos del diseños de un docuemento
Practica 6 complementos del diseños de un docuementoRoberto Duarte
 
Historia del diseño gráfico
Historia del diseño gráficoHistoria del diseño gráfico
Historia del diseño gráfico
Nancy Marilith
 

Viewers also liked (19)

V36130135
V36130135V36130135
V36130135
 
R36100108
R36100108R36100108
R36100108
 
P368995
P368995P368995
P368995
 
L367174
L367174L367174
L367174
 
K366470
K366470K366470
K366470
 
O368588
O368588O368588
O368588
 
N367984
N367984N367984
N367984
 
Kel 1
Kel 1Kel 1
Kel 1
 
X36141145
X36141145X36141145
X36141145
 
W36136140
W36136140W36136140
W36136140
 
S36109115
S36109115S36109115
S36109115
 
U36123129
U36123129U36123129
U36123129
 
Q369699
Q369699Q369699
Q369699
 
Սասունցի Դավիթ
Սասունցի ԴավիթՍասունցի Դավիթ
Սասունցի Դավիթ
 
Module 6 lesson 8
Module 6 lesson 8Module 6 lesson 8
Module 6 lesson 8
 
Leccion # 11 parte ii
Leccion # 11 parte iiLeccion # 11 parte ii
Leccion # 11 parte ii
 
Intervención, final
Intervención, final Intervención, final
Intervención, final
 
Practica 6 complementos del diseños de un docuemento
Practica 6 complementos del diseños de un docuementoPractica 6 complementos del diseños de un docuemento
Practica 6 complementos del diseños de un docuemento
 
Historia del diseño gráfico
Historia del diseño gráficoHistoria del diseño gráfico
Historia del diseño gráfico
 

Similar to Y36146148

Wireless network security
Wireless network security Wireless network security
Wireless network security
Aurobindo Nayak
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
AmanuelZewdie4
 
lecture_5.pptx
lecture_5.pptxlecture_5.pptx
lecture_5.pptx
sagar637395
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)
Wail Hassan
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
IOSR Journals
 
Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignment
Bijay Bista
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
dxmuthu
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptpmuthumca51
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
ijmnct
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Eric Vanderburg
 
Seminar
SeminarSeminar
Seminar
cnnithin
 
Iot module2
Iot module2Iot module2
Darsh
DarshDarsh
Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2
IJERA Editor
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of Iots
Samantha Randall
 
Site survey- Deployement of Wi Fi
Site survey- Deployement of Wi FiSite survey- Deployement of Wi Fi
Site survey- Deployement of Wi FiAgreeta Sharma
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment
David Parker
 

Similar to Y36146148 (20)

Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
 
lecture_5.pptx
lecture_5.pptxlecture_5.pptx
lecture_5.pptx
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignment
 
Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking   Chapter 11 - Exploiting Wireless Networks - Eric VanderburgEthical hacking   Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
Ethical hacking Chapter 11 - Exploiting Wireless Networks - Eric Vanderburg
 
Seminar
SeminarSeminar
Seminar
 
Iot module2
Iot module2Iot module2
Iot module2
 
Pdf3
Pdf3Pdf3
Pdf3
 
Darsh
DarshDarsh
Darsh
 
Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of Iots
 
Site survey- Deployement of Wi Fi
Site survey- Deployement of Wi FiSite survey- Deployement of Wi Fi
Site survey- Deployement of Wi Fi
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

Y36146148

  • 1. K. Prasuna et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.146-148 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Secure Level Transmission in Wi-Fi Using Cryptography K. Prasuna1, M. Padmaja2 1 2 Asst.Professor, Vijaya Institute of Technology for Women, Enikepadu, INDIA. Associate Professor,VR Siddhartha College of Engineering, INDIA Abstract Wi-Fi, is a mechanism that allows electronic devices to exchange data wirelessly over a computer network WiFi suggests Wireless Fidelity, resembling the long-established audio-equipment classification term Hi-Fi or High Fidelity.This paper first gives some background information about WiFi system and security issues in ad hoc networks, then it concentrates on the specific security measures like hybrid encryption techniques using both AES and RSA algorithms and also the different standards. To provide the security for the data transmitted through WiFi ,it uses WEP algorithm,WEP64 and WEP128 and then it moves to WPA (Wi-Fi Protected Access) as the key is short in WEP.WPA use the TKIP and depends on RC4,which consist of 128 bit and 48 bit. The security comparisons show that WPA and TPIK is more advantageous than WEP and hence it is more preferable. Keywords-Wi-Fi, WEP, WPA, TPIK I. INTRODUCTION Wi-Fi is a wireless technology that uses radio frequency to transmit data through the air. In Short called wireless fidelity and is meant to be used generically when referring to any type of 802.11 network, whether 802.11b, 802.11a, 802.11g, dualband, etc.The 802.11 standard reserves the low levels of the OSI model for a wireless connection that uses electromagnetic waves.The physical layer , which offers three types of information encoding. The data link layer, comprised of two sub-layers: Logical Link Control (or LLC) and Media Access Control (or MAC). The physical layer defines the radio wave modulation and signaling characteristics for data transmission, while the data link layer defines the interface between the machine's bus and the physical layer, in particular an access method close to the one used in the Ethernet standard and rules for communication between the stations of the network. The 802.11 standard actually has three physical layers, which define alternative modes of transmission: Data Link Layer Physical Layer 802.2 DSSS 802.11 FHSS,Infrared II. THE VARIOUS WI-FI STANDARDS The IEEE 802.11 standard is actually only the earliest standard, allowing 1-2 Mbps of bandwidth. Amendments have be made to the original standard in order to optimise bandwidth (these include the 802.11a, 802.11b and 802.11g standards, which are called 802.11 physical standards) or to better specify components in order to ensure improved security or compatibility. the various www.ijera.com amendments to the 802.11 standard and their significance are given as 802.11a-Wifi5 :The 802.11a standard (called WiFi 5) allows higher bandwidth (54 Mbps maximum throughput, 30 Mbps in practice). The 802.11a standard provides 8 radio channels in the 5 GHz frequency band. 802.11b-WiFi:The 802.11b standard is currently the most widely used one. It offers a maximum thoroughput of 11 Mbps (6 Mbps in practice) and a reach of up to 300 metres in an open environment. It uses the 2.4 GHz frequency range, with 3 radio channels available. 802.11c-Bridging 802.11 and 802.1d:The 802.11c bridging standard is of no interest to the general public. It is only an amended version of the 802.1d standard that lets 802.1d bridge with 802.11compatible devices (on the data link level). 802.11d-Internationalisation:The 802.11d standard is a supplement to the 802.11 standard which is meant to allow international use of local 802.11 networks. It lets different devices trade information on frequency ranges depending on what is permitted in the country where the device is from. 802.11e-Improving service quality:The 802.11e standard is meant to improve the quality of service at the level of the data link layer. The standard's goal is to define the requirements of different packets in terms of bandwidth and transmission delay so as to allow better transmission of voice and video. 802.11f-Roaming:The 802.11f is a recommendation for access point vendors that allows products to be more compatible. It uses the Inter-Access Point Roaming Protocol, which lets a roaming user transparently switch from one access point to another while moving around, no matter what brands of 146 | P a g e
  • 2. K. Prasuna et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.146-148 access points are used on the network infrastructure. This ability is also simply called roaming. 802.11g:The 802.11g standard offers high bandwidth (54 Mbps maximum throughput, 30 Mbps in practice) on the 2.4 GHz frequency range. The 802.11g standard is backwards-compatible with the 802.11b standard, meaning that devices that support the 802.11g standard can also work with 802.11b. 802.11h:The 802.11h standard is intended to bring together the 802.11 standard and the European standard (HiperLAN 2, hence the h in 802.11h) while conforming to European regulations related to frequency use and energy efficiency. 802.11i:The 802.11i standard is meant to improve the security of data transfers (by managing and distributing keys, and implementing encryption and authentication). This standard is based on the AES (Advanced Encryption Standard) and can encrypt transmissions that run on 802.11a, 802.11b and 802.11g technologies. 802.11Ir:The 802.11r stadard has been elaborated so that it may use infra-red signals. This standard has become technologically obsolete. 802.11j:The 802.11j standard is to Japanese regulation what the 802.11h is to European regulation. The 802.11a, 802.11b and 802.11g standards, called "physical standards" are amendments to the 802.11 standard and offer different modes of operation, which lets them reach different data transfer speeds. III. WEP WEP known as Wired Equivalent Privacy.The main goal of WEP is to make Wi-Fi network at least as secure as wired LANand to encrpt data transmitted to prevent the attackers from getting the information.WEP offers services such as message confidentiality,message integrity and authencity and access control to the network. WEP uses encryption algorithm called RC4.The key divided into two parts:IV(InitialVector) of 24 bits and Secret key of 40 bitsor 104 bits.There are two kinds of WEP-WEP64(40bit+24bit) and WEP 128(104bit+24bit). This key is all-important to WEP in that it is also used in the encryption process to uniquely scramble each packet of information with a unique password. This ensures that if a hacker cracks one packets key,he won’t be able to view every packet’s information.WEP defines a method to create a unique secret key for each packet using the 5- or 13characters of the pre-shared key and three more psuedo-randomly selected characters picked by the wireless hardware. RC4 Algorithm RC4 is the encryption algorithm used to cipher the data sent over the airwaves. It is important that data is scrambled; otherwise, anyone could “see” everything using a sniffer. This includes all e-mails, www.ijera.com www.ijera.com Web pages, documents, and more. RC4 is a very simple and fast method of encryption that scrambles each and every byte of data sent in a packet.It does this through a series of equations using the previously discussed secret key.RC4 actually consists of two parts: the Key Scheduling Algorithm and the Psuedo Random Generation Algorithm. Each part is responsible for a different part of the encryption process. KSA (Key Scheduling Algorithm) The Key Scheduling Algorithm is the first part of the encryption process. The following is the algorithm actually used in RC4. 1. Assume N = 256 2. K[] = Secrete Key array 3. Initialization: 4. For i = 0 to N – 1 5. S[i] = i 6. j = 0 7. Scrambling: 8. For i = 0 ... N – 1 9. j = j + S[i] + K[i] 10. Swap(S[i], S[j]) PRGA The PRGA (Psuedo Random Generation Algorithm) is the part of the RC4 process that outputs a streaming key based on the KSA’s psuedo random state array. This streaming key is then merged with the plaintext data to create a stream of data that is encrypted. 1. Initialization: 2. i = 0 3. j = 0 4. Generation Loop: 5. i = i + 1 6. j = j + S[i] 7. Swap(S[i], S[j]) 8. Output z = S[S[i] + S[j]] 9. Output XORed with data The reason of transition to WPA.The same IV can be used more than once.The secret key is common in WEP.The key that WEP uses is short.Most users usually do not change their keys. WPA:WPA known as Wi-Fi Protected Access.WPA use the TKIP and depends on RC4.The key in WPA consist of 128 bit and 48 bit for initial vector TKIP:TKIP is a security protocol used in the IEEE 802.11 wireless networking standard.TKIP was a solution to replace WEP without requiring the replacement of legacy hardware..TKIP implement three new security features.TKIP implements a key mixing function.WPA implements a sequence counter to protect against replay attacks.Finally ,TKIP implements a 64-bit message integrity check named MICHAEL 147 | P a g e
  • 3. K. Prasuna et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.146-148 Encryption Key rotation Key distribution WEP RC4 None Manually typed into each device IV. WPA RC4 Dynamic sessionke ys Automati c distributi on WPA2 AES Dynamic sessionkeys Automatic distribution CONCLUSIONS [8] [9] [10] [11] www.ijera.com Vebjørn Moen, H°avard Raddum, Kjell J. Hole, “Weaknesses in theTemporal Key Hash of WPA”, University of Bergen,2005 Arunesh Mishra, William, A. Arbaugh, “An Initial Security Analysisof the IEEE 802.1X Standard”, University of Meryland, 2002 Vebjørn Moen, H°avard Raddum, Kjell J. Hole; “Weaknesses in theTemporal Key Hash of WPA”; Mobile Computing andCommunications Review, 2005 John L. MacMichael; “Auditing Wi-Fi Protected Access (WPA)Pre-Shared Key Mode”; Linux Journal, 2005. As discussed above, security is not one time job. Security is constant vigilance against threats and attacks. We cannot eliminate hackers, pirates, thieves, etc. from the face of the earth. WPA (Wi-Fi Protected Access) is the next generation of wireless encryption technologies. It’s far more secure and easier to configure than WEP. Almost all network devices support this. WPA replaces WEP with an improved encryption algorithm called Temporal Key Integrity Protocol (TKIP). TKIP supplies each client with a unique key and uses much longer keys that are rotated at a configurable interval. WPA also includes an encrypted message integrity check field in the packet to prevent denial-of-service and spoofing attacks, something that neither static for security. It can be used in Personal or Enterprise modes and has so far proven difficult to attack. It is recommended to use WPA or WPA2 encryption. REFERENCES [1] [2] [3] [4] [5] [6] [7] Arash Habibi Lashkari, F. Towhidi, R. S. Hoseini, “Wired EquivalentPrivacy(WEP)”, ICFCC Kuala Lumpur Conference, Published byIEEE Computer Society, Indexed by THAMSON ISI, 2009 Donggang Liu, P. N., “Security for Wireless Sensor Networks”,Springer., November, 2006 Garcia, R. H. a. M., “AN ANALYSIS OF WIRELESS SECURITY”,CCSC: South Central Conference. 2006 Kempf, J., “Wireless Internet Security: Architecture and Protocols“,Cambridge University Press. October, 2008 Hani Ragab Hassan, Yacine Challal, “Enhanced WEP: An efficientsolution to WEP threats”, IEEE 2005 Halil Ibrahim BULBUL, Ihsan BATMAZ, Mesut OZEL,“Comparison of WEP (Wired Equivalent Privacy) Mechanism, WPA(WiFi Protected Access) and RSN (Robust Security Network)Security Protocols”; eForensics January 2008, Adelaide ,Australia. Gamal Selim, Hesham M. El Badawy, Mohamed Abdul Salam,“NEW PROTOCOL DESIGN FOR WIRELESS NETWORKSSECURITY”, IEEE Explore www.ijera.com 148 | P a g e