Wireless Network Security: Susceptibilities, Extortion and kiosk
Keywords:
Wireless Network, Wireless Security, Wireless Threats, WEP, RC4, AES, IEEE 802.11, WPAAbstract
Wireless networking brings a whole new meaning to network security risk analysis and mitigation. With readily available equipment, attacks on wireless networks are very easy. The wireless security mechanism is not same as in wired networks. Because there is no user controlling for each individual node, wireless environment, and more importantly, scarce energy resources. The wireless security mechanism is not same as in wired networks. Because there is no user-controlling for each individual node, wireless environment, and more importantly, scarce energy resources. This paper looks at the basic risks inherent in wireless networking security protects a wireless network by denying access to the network itself before a user is successfully authenticated. This paper proposed a new security model which addresses three important types of active attacks like Rushing attack, Black hole and Replay attack. By using 3-roundof well known AES algorithm we implement this model. Thus it is easy for the administrator to identify these attacks using WPA. Different types of attack there related information, different cryptographic strength and performance of the proposed model get analyzed in this system. One particularly important improvement over the WPA standards is the inclusion of the Advanced Encryption Standard (AES) which could be used in many rounds to protect the overall network from the external attacks.
References
. B. Parno, A. Perrig, and V.D. Gligor, “Distributed Detection of Node Replication Attacks in Sensor B. Parno, A. Perrig, and V.D. Gligor, “Distributed Detection of Node Replication Attacks in Sensor Networks,” Proc. IEEE Symposium. Security and Privacy, pp. 49-63, May 2005
. Kai Xing Fang, Liu Xiuzhen, Cheng David, H. C. Du, Real-Time Detection of Clone Attacks in Wireless Sensor Networks Proceedings of the 28th International Conference on Distributed Computing Systems, 2008, Pages 3-10.
. Klempous R.; Nikodem J.; Radosz, L.; Raus, N. Byzantine Algorithms in Wireless Sensors Network, Wroclaw Univ. of Technology .,Wroclaw; Information and Automation, 2006. ICIA2006.International Conference on, 15-17 Dec. 2006, pages :319-324
. Mehmet Ulema and Barcin Kozbe, “Management of Next-generation Wireless Networks and Services”, IEEE Communications Managing, February 2003.
. B. Parno, A. Perrig, and V.D. Gligor, “Distributed Detection of Node Replication Attacks in Sensor B. Parno, A. Perrig, and V.D. Gligor, “Distributed Detection of Node Replication Attacks in Sensor Networks,” Proc. IEEE Symposium. Security and Privacy, pp. 49-63, May 2005.
. Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,” IEEE Communication. Surveys Tutorials, vol. 8, pp. 2–23, year 2006
. Security in Mobile Ad Hoc Networks: Challenges and Solutions H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang IEEE Wireless Communications, Vol.11, Issue 1, pp. 38-47, 2004
. Fluhrer, S., Mantin, I. and Shamir, A. 2001. Weaknesses in the Key Scheduling Algorithm of RC4, Selected Areas in Cryptography 2001, Lecture Notes in Computer Science, Vol. 2259, pp. 1-24. Springer.
. Mead, N.R. and McGraw, G. 2003. Wireless Security’s Future, IEEE Security and Privacy, 1 (4), pp. 68-72.
. Joseph Binder, Hans Peter Bischof, Zero Knowledge Proofs of Identityfor Ad Hoc Wireless Networks An In-Depth Study Technical Report, 2003
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
