Loading…

Using WEP in ad-hoc networks

Nowadays, with the normalization of the 802.11 standard and the emerging of Wi-Fi low cost devices, many testbeds use this wireless technology to realize ad-hoc networks. The 802.11 security protocol, WEP, has not been designed by security experts. It results in a flawed protocol. The secret key sha...

Full description

Saved in:
Bibliographic Details
Main Author: Guyot, V.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Nowadays, with the normalization of the 802.11 standard and the emerging of Wi-Fi low cost devices, many testbeds use this wireless technology to realize ad-hoc networks. The 802.11 security protocol, WEP, has not been designed by security experts. It results in a flawed protocol. The secret key shared between all 802.11 devices can be retrieved by attackers which are passively collecting data over the wireless network. TKIP, which solves this problem by periodically refreshing the keys between the access points and the wireless clients, has been standardized. But 802.11 ad-hoc networks remain unsafe. We address the problem of security in ad-hoc environments by using smart cards to handle the actual WEP-based 802.11 networking adapters to refresh the WEP key, like TKIP does in infrastructure environments
ISSN:1811-3923
DOI:10.1109/WOCN.2006.1666575