Journal of Applied Science and Engineering

Published by Tamkang University Press

1.30

Impact Factor

2.10

CiteScore

T. H. Tseng  1 and F. Ye1

1Department of Electrical Engineering Tamkang University Tamsui, Taiwan, R.O.C.


 

Received: February 21, 2003
Accepted: April 21, 2003
Publication Date: June 1, 2003

Download Citation: ||https://doi.org/10.6180/jase.2003.6.2.07  


ABSTRACT


The main idea of this paper is to present an upper-layer security solution to solve security problems of the wireless network. The IEEE 802.11 standard defines the Wired Equivalent Privacy (WEP) Protocol. The goal of WEP is to provide data privacy to the wireless network. It is generally believed that the current wireless access points have a big security problem with WEP protocol. To solve this problem, a combination of Linux-based access point and IPSec bridge has been brought up to secure the wireless network.


Keywords: Linux, IPSec, Bridge, Access Point, WEP, 802.11, Security, Wireless


REFERENCES


  1. [1] Borisov, N., Goldberg, I. and Wagner, D., “Intercepting Mobile Communications: The Insecurity of 802.11,” http://www.isaac.cs. berkeley.edu/isaac/wep-faq.html.
  2. [2] “LAN MAN Standards of the IEEE Computer Society. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification. IEEE Standard 802.11, 1997 Edition”, IEEE Standard 802.11, 1997.
  3. [3] Rivest, R. L. The RC4 Encryption Algorithm, March 1992.
  4. [4] Mantin, I., “Analysis of the Stream Cipher RC4,” Master's Thesis, Weizmann Institute of Science, 2001.
  5. [5] Fluhrer, S., Mantin, I. and Shamir, A., “Weaknesses in the Key Scheduling Algorithm of RC4,” Proceedings of SAC ‘01, 2001.
  6. [6] Fluhrer, S., Mantin, I. and Shamir, A., “Attacks on RC4 and WEP,” Cryptobytes, 2002.
  7. [7] Golic, J., “Linear Statistical Weakness of Alleged RC4 Key Stream Generator,” Proceedings of EUROCRYPT ’97, 1997.
  8. [8] Mantin, I. and Shamir, A., “A Practical Attack on Broadcast RC4,” Proceedings of Fast Software Encryption ’01, 2001.
  9. [9] AirSnort Project, http://airsnort.shmoo.com/.
  10. [10] Fluhrer, S. R. and McGrew, D. A., “Statistical Analysis of the Alleged RC4 Key Stream Generator,” Proceedings of Fast Software Encryption ’00, 2000.
  11. [11] Knudsen, L. R., Meier, W., Preneel, B., Rijmen, V. and Verdoolaege, S., ”Analysis Methods for (Alleged) RC4,” Proceedings of ASIACRYPT ’98, 1998.
  12. [12] Dawson, E. and Nielsen, L., “Automated Cryptanalysis of XOR Plaintext Strings,” Cryptologia, pp. 165-181, April 1996.
  13. [13] Walker, J., “Unsafe at Any Key Size: An Analysis of the WEP Encapsulation,” Intel Corporation, November 2000.
  14. [14] HostAP Driver for Intersil Prism2/2.5/3, http://hostap.epitest.fi/
  15. [15] FreeS/WAN Project, http://www.freeswan. org/ .
  16. [16] Lucent Orinoco, User’s Guide for the ORINOCO Manager’s Suite, November 2000.