Table 2 - uploaded by Jonathan Kok-Keong Loo
Content may be subject to copyright.
Characteristics of WEP and WPA

Characteristics of WEP and WPA

Source publication
Article
Full-text available
The Wireless Mesh Network (WMN) is ubiquitous emerging broadband wireless network. However, the open wireless medium, multi-hop multi-radio architecture and ad-hoc connectivity amongst end-users are such characteristics which increases the vulnerabilities of WMN towards many passive and active attacks. A secure network ensures the confidentiality,...

Context in source publication

Context 1
... is backward compatible with WPA and uses a fresh set of keys for every session. The characteristics of WEP and WPA are summarized in Table 2.Keeping in view the above limitations of existing encryption and authentication mechanisms, we need enhanced security systems for the multi-hop ad-hoc broadband WMN. To deal with passive attacks and to protect the confidentiality, security mechanisms needs to be investigated are given in Table 1, and are summarize below. ...

Similar publications

Article
Full-text available
The broadcast nature of wireless network makes traditional link-layer attacks readily available to anyone within the range of the network. User authentication is best safeguard against the risk of unauthorized access to the wireless networks. The present 802.1× authentication scheme has some flaws, making mutual authentication impossible and open t...
Article
Full-text available
As the main secret-key encryption techniques of the wireless local area network (WLAN) have been proven to be unsafe, wireless network security is faced with serious challenges. It is unpractical for home users and small companies to buy expansive network equipments to improve the network security. Therefore, the secure strategy of wireless network...
Article
Full-text available
Time division multiple access (TDMA)-based medium access control (MAC) protocols can guarantee quality of service (QoS) in wireless environments. However, in an environment where multihop packet transmissions are necessary for real-time communications, each node may experience the well-known queuing delay. This queuing delay increases multihop pack...
Conference Paper
Full-text available
With the widespread use of wireless network services and applications, security is a major concern. From wireless network security aspects, authentication for services is very important especially in Internet banking. In this paper, an authentication method for wireless networks using dynamic key theory is presented. The dynamic key theory is used...
Article
Full-text available
Wireless networks have some security issues, mainly due to its wireless nature (open and non-physical), that need to be addressed. One of the solutions to improve wireless network security is the IEEE 802.1X specification, which is based on Extensible Authentication Protocol (EAP). EAP is an authentication framework that can support multiple authen...

Citations

... What is surely different is the approach, and therefore they differ in implementation cost and ease of implementation in the first place. The passive attacks lay a foundation for later launching an active attacks either against the wireless network resources or end-users nodes (Khan et al., 2008). Cryptographic power costs are high, and such operations shall be restricted in time. ...
Article
Full-text available
Improving smart environment communication remains a final unachievable destination. Continuous optimization in smart environment communication is mandatory because of an emerging number of connected devices. Carefully observing its parameters and demands leads to acknowledging existing challenges and boundaries regarding areas covered with signal and possibilities of approaching network architecture, limited battery resources in certain nodes of network architecture, privacy, and security of existing data transfer. One approach to dealing with these communication challenges and boundaries is focusing on important technical parameters respectively, signal processing speed, communication nodes distance, and communication channel security. The aim of this article is to point out these most important communication parameters in smart environments and how changing those can affect communication. Its original contribution is represented in establishing principles for governing security parameters by using permanent magnets in order to produce Faraday's rotation and thus manipulate the whole process of communication in a smart environment.
... The authors have considered two types of resource optimization problems, formulated and solved them. Khan, Shafiullah, [4] discusses "Secure Routing Protocol using Cross Layer Design and Energy Harvesting in Wireless Sensor Networks". The Energy Harvesting scheme is used in routing protocols to address the energy efficiency in Wireless Sensor networks. ...
Research
: A Wireless Body Area Network (WBAN) are used to connect wearable computing devices and are designed to operate autonomously in a wireless environment. The research is on progress in designing a system of health observance to meet the technical demand especially in a Wireless Body Area Network. In these Body Area Networks, the parameters such as Packet Loss Rate (PLR), Delay, Quality of Service (QoS) and throughput have to be addressed in order to provide an efficient real-time data transmission. In this system, Trust Secure Energy Optimized Aggregation Protocol(TSEOAP) and a Secure Trust-Multipath Optimized Link State Routing (STMOLSR) is proposed where TSEOAP is a reactive protocol, which has higher latency since the routes are discovered when the source node initiates a request, STMOLSR is a proactive routing protocol, which has low latency based on routing operation. So, by comparing these two protocols, proactive is a better one as prevention is better than cure. A Retransmission Scheme based on Priority is designed in which the emergency packets are given a higher priority so that the performance of the system is increased. The behaviour of each node will be evaluated by using trust based reasoning which uses the OLSR protocol. For detection of malicious node, a Detection System is used to detect the intruders. Crypto Encryption is known for its tremendous speed and effective when compared to other encryption techniques. To enhance the security aspects, the encryption and decryption algorithms should be improved.
... For that reason, it very difficult to distinguish the security breaches from a variation on link qualities, node failure. Thus, resource constraints nature of WSN needs the implementation of various security mechanisms for the secure transmission of information sensed by the sensor node [7]. ...
... Wireless sensors are deployed in the remote and unattended area to measure the physical characteristic of the environment such as humidity, temperature, pressure, moisture, etc. Due to the resource-constrained nature and working at the area where human survival is difficult, the set of characteristics of the sensor node should be considered. The major characteristics of WSN are listed below [7]. ...
Article
Full-text available
Due to the technological advancement in wireless communication, energy-efficient power supply, and semiconductor technology, the smart sensor becomes popular in many applications. In WSN, the private data collected and processed by the sensor node must be protected from the malicious attack. Due to the resource constraint nature of WSN, the traditional security protocols do not apply to this network as it involves huge and complex computation. Furthermore, the energy supplied by the battery is not renewable. This paper proposes a secure cluster-based multiple-hop routing protocol for prolonging the lifetime of WSN and securing the data in transit and storage. This protocol proposes the matrix transposition cryptographic techniques for securing the sensor data. This protocol compares the energy consumption and throughput of two secure routing protocols.
... The authors have considered two types of resource optimization problems, formulated and solved them. Khan, Shafiullah, [4] discusses "Secure Routing Protocol using Cross Layer Design and Energy Harvesting in Wireless Sensor Networks". The Energy Harvesting scheme is used in routing protocols to address the energy efficiency in Wireless Sensor networks. ...
Article
A Wireless Body Area Network (WBAN) are used to connect wearable computing devices and are designed to operate autonomously in a wireless environment. The research is on progress in designing a system of health observance to meet the technical demand especially in a Wireless Body Area Network. In these Body Area Networks, the parameters such as Packet Loss Rate (PLR), Delay, Quality of Service (QoS) and throughput have to be addressed in order to provide an efficient real-time data transmission. In this system, Trust Secure Energy Optimized Aggregation Protocol(TSEOAP) and a Secure Trust-Multipath Optimized Link State Routing (STMOLSR) is proposed where TSEOAP is a reactive protocol, which has higher latency since the routes are discovered when the source node initiates a request, STMOLSR is a proactive routing protocol, which has low latency based on routing operation. So, by comparing these two protocols, proactive is a better one as prevention is better than cure. A Retransmission Scheme based on Priority is designed in which the emergency packets are given a higher priority so that the performance of the system is increased. The behaviour of each node will be evaluated by using trust based reasoning which uses the OLSR protocol. For detection of malicious node, a Detection System is used to detect the intruders. Crypto Encryption is known for its tremendous speed and effective when compared to other encryption techniques. To enhance the security aspects, the encryption and decryption algorithms should be improved.
... In addition, this method exchange strong secret key which enables the two parties to communicate securely. Also it is secure against attacks like dictionary attacks, passive attacks [6] or active attacks [7] network intruders and masquerade attacks [8]. Finally, this paper is comprises into three sections namely, Section 2 discusses the background of authentication and authorization aspects and its vulnerabilities. ...
Article
In a distributed system, authentication protocols are the basis of security to ensure that these protocols function properly. Passwords are one of the most common authentication protocol used nowadays. Because of low entropy of passwords make the systems vulnerable to password guessing attacks. This paper presents a simple scheme that strengthens password-based authentication protocols and helps prevent dictionary attacks, replay attacks and man in the middle attacks etc. The proposed scheme presents a new password authentication protocol by using the user and server system identification/serial number. Here there is no possibility to store the user passwords so an attacker who gets the password cannot use it directly to gain immediate access and compromise security.
... Khan, Shafiullah, et al [1] discusses "Secure Routing Protocol using Cross Layer Design and Energy Harvesting in Wireless Sensor Networks" Energy efficiency is the main concern of research community while designing routing protocols for wireless sensor networks (WSNs). This concern can be addressed by using energy-harvesting scheme in routing protocols. ...
... (i) Passive attacks and (ii) Active attacks 3.1 Passive Attacks: These attacks are referred to just listening the communication. In this kind of attack, an intruder watches the communications silently but does not make any changes in communication [1]. However, these attacks are normally preliminary arrangements before the active attacks. ...
... In addition, this method exchange strong secret key which enables the two parties to communicate securely. Also it is secure against attacks like dictionary attacks, passive attacks [6] or active attacks [7] network intruders and masquerade attacks [8]. Finally, this paper is comprised into three sections namely, Section 2 discusses the background of authentication and authorization aspects and its vulnerabilities. ...
Article
In a distributed system, authentication protocols are the basis of security to ensure that these protocols function properly. Passwords are one of the most common authentication protocol used nowadays. Because of low entropy of passwords makes the systems vulnerable to password guessing attacks. This paper presents a simple scheme that strengthens password-based authentication protocols and helps prevent dictionary attacks, replay attacks and man in the middle attacks etc., The proposed scheme presents a new password authentication protocol by using the user and server system identification/serial number. Here there is no possibility to store the user passwords so an attacker who gets the password cannot use it directly to gain immediate access and compromise security.
... • G = |log file| -|sliding window| The detection server captures the system calls sent by the user to the server when the user is executing shell commands and are stored in user's log file. The server tries to check whether the user is actual account holder or not by comparing the similarity scores [14] between newly generated system calls and the user's usage habits files. ...
Article
Internal Intrusion detection is one of the serious problems in the computer network areas. Most of the computer system uses username and password as login pattern to enter in to the system. This is one of the weakest points of computer security. Some studies claimed that analyzing system calls (SCs) generated by commands can identify these commands and obtains the features of an attack. This paper propose a security system, named the Internal Intrusion Detection and Protection System(IIDPS) to detect insider attacks at SC level by using data mining and forensic techniques in networked data. The IIDPS creates users' personal profiles to keep track of users' usage habits as their forensic features and determines whether a valid login user is the account holder or not by comparing users current computer usage behaviors with the patterns collected in the account holder's personal profile. The idea behind the inside attacker detection in wireless sensor network by exploiting the spatial correlation between the packet ratio, which help to detecting dynamic attacking behaviors The routing is performed to identify the shortest path between each source node and their destination address and residual energy is calculated for each node in the network. Index Terms— Insider attacks, intrusion detection, Flow based classification and System calls.
... These attacks are referred to just listening the communication. In this kind of attack, an intruder snoops the communications silently but does not make any changes in communication [8]. However, these attacks are normally preliminary arrangements before the active attacks. ...
Article
Full-text available
Lately, Wireless Sensor Networks (WSNs) have become an emerging technology and can be utilized in some crucial circumstances like battlegrounds, commercial applications, habitat observing, buildings, smart homes, traffic surveillance and other different places. One of the foremost difficulties that WSN faces nowadays is protection from serious attacks. While organizing the sensor nodes in an abandoned environment makes network systems helpless against an assortment of strong assaults, intrinsic memory and power restrictions of sensor nodes make the traditional security arrangements impractical. The sensing knowledge combined with the wireless communication and processing power makes it lucrative for being abused. The wireless sensor network technology also obtains a big variety of security intimidations. This paper describes four basic security threats and many active attacks on WSN with their possible countermeasures proposed by different research scholars.
... It is extremely necessary to design such mechanism for WMNs which use fewer resources and light weight. The reason is that infrastructure-less WMNs have many design constraints such as low energy, low bandwidth, limited processing, memory constraints and are highly vulnerable to many security attach such as passive, active and Denial of Service (DoS) (Khan et al., 2008b). There are lots of security issues present in the multi hoop decentralized network such as WMN. ...
Article
Intrusion is something which is unsolicited activity and which might be used to interrupt the functions of wireless network. If we talk about wireless networks, having centralized monitoring policy; therefore it is very much easy to detect and eliminate intrusions efficiently. But when we look forward to wireless scenario, especially in the multi hop wireless network, intrusion activities are more because of the lack of centralized monitoring policy. Wireless network is very much vulnerable to different kinds of attacks and intrusions at different OSI layer due to mainly co-operation among their noses. Intrusion detection is the most fundamental component of defense in depth strategy, are capable to identify security attacks and raise an alarm to inform authorities. Intrusion detection system, a passive defense strategy informs about attacks to network administrator because the attacks come easy to wireless network. Intrusion detection system is a second line of defense. Lots of IDSs are proposed in the literature, capable to detect attacks in a particular layer of the OSI model. Here we are proposing Cross layer IDSs, which is capable to detect multiple layer possible attacks.