UDC 004.492

Holistic Approach to Wep Protocol in Securing Wireless Network Infrastructure

Radomir Prodanović1 and Dejan Simić2

  1. Serbia Army, Air Forces and Aircraft Defense
    11000 Belgrade, Serbia
    radisa100@ptt.yu
  2. Faculty of Organizational Sciences
    POB 52, 11000 Belgrade, Serbia
    dsimic@fon.bg.ac.yu

Abstract

Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication, confidentiality and integrity. The paper, also, gives a summary of security improvements of WEP protocol that can lead to the higher level of wireless network infrastructure protection. Comparative analysis shows the advantages of the new 802.11i standard in comparison to the previous security solutions. A proposal of possible security improvements of RSNA (Robust Security Network Association) is presented.

Publication information

Volume 3, Issue 2 (December 2006)
Year of Publication: 2006
ISSN: 2406-1018 (Online)
Publisher: ComSIS Consortium

Full text

DownloadAvailable in PDF
Portable Document Format

How to cite

Prodanović, R., Simić, D.: Holistic Approach to Wep Protocol in Securing Wireless Network Infrastructure. Computer Science and Information Systems, Vol. 3, No. 2, 97-113. (2006)