Loading…

Using WEP in ad-hoc networks

Nowadays, with the normalization of the 802.11 standard and the emerging of Wi-Fi low cost devices, many testbeds use this wireless technology to realize ad-hoc networks. The 802.11 security protocol, WEP, has not been designed by security experts. It results in a flawed protocol. The secret key sha...

Full description

Saved in:
Bibliographic Details
Main Author: Guyot, V.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 4
container_issue
container_start_page 4 pp.
container_title
container_volume
creator Guyot, V.
description Nowadays, with the normalization of the 802.11 standard and the emerging of Wi-Fi low cost devices, many testbeds use this wireless technology to realize ad-hoc networks. The 802.11 security protocol, WEP, has not been designed by security experts. It results in a flawed protocol. The secret key shared between all 802.11 devices can be retrieved by attackers which are passively collecting data over the wireless network. TKIP, which solves this problem by periodically refreshing the keys between the access points and the wireless clients, has been standardized. But 802.11 ad-hoc networks remain unsafe. We address the problem of security in ad-hoc environments by using smart cards to handle the actual WEP-based 802.11 networking adapters to refresh the WEP key, like TKIP does in infrastructure environments
doi_str_mv 10.1109/WOCN.2006.1666575
format conference_proceeding
fullrecord <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_1666575</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1666575</ieee_id><sourcerecordid>1666575</sourcerecordid><originalsourceid>FETCH-LOGICAL-h124t-f820f49f61e5fb3c367ce4572d9e69e855e049a50ac0118a72805a1124b28c4f3</originalsourceid><addsrcrecordid>eNotj8tKA0EQAAeikBD3A0QP-wOzds-z5yhLfEAwHgw5hsmkJ9moG9kJiH-vYE51qoIS4hqhQYRwt1q0L40CcA0656y3I1EFT2iUMaANwIWYICFKHZQei6qUAwBoJCIME3G7LF2_q1ez17rr67iV-2Oqez59H4f3ciUuc_woXJ05FcuH2Vv7JOeLx-f2fi73qMxJZlKQTcgO2eaNTtr5xMZ6tQ3sApO1DCZECzEBIkWvCGzEP3ejKJmsp-Lmv9sx8_pr6D7j8LM-_-hfjJE7Wg</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Using WEP in ad-hoc networks</title><source>IEEE Xplore All Conference Series</source><creator>Guyot, V.</creator><creatorcontrib>Guyot, V.</creatorcontrib><description>Nowadays, with the normalization of the 802.11 standard and the emerging of Wi-Fi low cost devices, many testbeds use this wireless technology to realize ad-hoc networks. The 802.11 security protocol, WEP, has not been designed by security experts. It results in a flawed protocol. The secret key shared between all 802.11 devices can be retrieved by attackers which are passively collecting data over the wireless network. TKIP, which solves this problem by periodically refreshing the keys between the access points and the wireless clients, has been standardized. But 802.11 ad-hoc networks remain unsafe. We address the problem of security in ad-hoc environments by using smart cards to handle the actual WEP-based 802.11 networking adapters to refresh the WEP key, like TKIP does in infrastructure environments</description><identifier>ISSN: 1811-3923</identifier><identifier>ISBN: 9781424403400</identifier><identifier>ISBN: 1424403405</identifier><identifier>DOI: 10.1109/WOCN.2006.1666575</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access protocols ; Ad hoc networks ; Communication system security ; Costs ; Data security ; Information retrieval ; Intelligent networks ; Smart cards ; Testing ; Wireless networks</subject><ispartof>2006 IFIP International Conference on Wireless and Optical Communications Networks, 2006, p.4 pp.-4</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1666575$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,4050,4051,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1666575$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Guyot, V.</creatorcontrib><title>Using WEP in ad-hoc networks</title><title>2006 IFIP International Conference on Wireless and Optical Communications Networks</title><addtitle>WOCN</addtitle><description>Nowadays, with the normalization of the 802.11 standard and the emerging of Wi-Fi low cost devices, many testbeds use this wireless technology to realize ad-hoc networks. The 802.11 security protocol, WEP, has not been designed by security experts. It results in a flawed protocol. The secret key shared between all 802.11 devices can be retrieved by attackers which are passively collecting data over the wireless network. TKIP, which solves this problem by periodically refreshing the keys between the access points and the wireless clients, has been standardized. But 802.11 ad-hoc networks remain unsafe. We address the problem of security in ad-hoc environments by using smart cards to handle the actual WEP-based 802.11 networking adapters to refresh the WEP key, like TKIP does in infrastructure environments</description><subject>Access protocols</subject><subject>Ad hoc networks</subject><subject>Communication system security</subject><subject>Costs</subject><subject>Data security</subject><subject>Information retrieval</subject><subject>Intelligent networks</subject><subject>Smart cards</subject><subject>Testing</subject><subject>Wireless networks</subject><issn>1811-3923</issn><isbn>9781424403400</isbn><isbn>1424403405</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotj8tKA0EQAAeikBD3A0QP-wOzds-z5yhLfEAwHgw5hsmkJ9moG9kJiH-vYE51qoIS4hqhQYRwt1q0L40CcA0656y3I1EFT2iUMaANwIWYICFKHZQei6qUAwBoJCIME3G7LF2_q1ez17rr67iV-2Oqez59H4f3ciUuc_woXJ05FcuH2Vv7JOeLx-f2fi73qMxJZlKQTcgO2eaNTtr5xMZ6tQ3sApO1DCZECzEBIkWvCGzEP3ejKJmsp-Lmv9sx8_pr6D7j8LM-_-hfjJE7Wg</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Guyot, V.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2006</creationdate><title>Using WEP in ad-hoc networks</title><author>Guyot, V.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-h124t-f820f49f61e5fb3c367ce4572d9e69e855e049a50ac0118a72805a1124b28c4f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Access protocols</topic><topic>Ad hoc networks</topic><topic>Communication system security</topic><topic>Costs</topic><topic>Data security</topic><topic>Information retrieval</topic><topic>Intelligent networks</topic><topic>Smart cards</topic><topic>Testing</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Guyot, V.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEL</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Guyot, V.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Using WEP in ad-hoc networks</atitle><btitle>2006 IFIP International Conference on Wireless and Optical Communications Networks</btitle><stitle>WOCN</stitle><date>2006</date><risdate>2006</risdate><spage>4 pp.</spage><epage>4</epage><pages>4 pp.-4</pages><issn>1811-3923</issn><isbn>9781424403400</isbn><isbn>1424403405</isbn><abstract>Nowadays, with the normalization of the 802.11 standard and the emerging of Wi-Fi low cost devices, many testbeds use this wireless technology to realize ad-hoc networks. The 802.11 security protocol, WEP, has not been designed by security experts. It results in a flawed protocol. The secret key shared between all 802.11 devices can be retrieved by attackers which are passively collecting data over the wireless network. TKIP, which solves this problem by periodically refreshing the keys between the access points and the wireless clients, has been standardized. But 802.11 ad-hoc networks remain unsafe. We address the problem of security in ad-hoc environments by using smart cards to handle the actual WEP-based 802.11 networking adapters to refresh the WEP key, like TKIP does in infrastructure environments</abstract><pub>IEEE</pub><doi>10.1109/WOCN.2006.1666575</doi></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1811-3923
ispartof 2006 IFIP International Conference on Wireless and Optical Communications Networks, 2006, p.4 pp.-4
issn 1811-3923
language eng
recordid cdi_ieee_primary_1666575
source IEEE Xplore All Conference Series
subjects Access protocols
Ad hoc networks
Communication system security
Costs
Data security
Information retrieval
Intelligent networks
Smart cards
Testing
Wireless networks
title Using WEP in ad-hoc networks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T01%3A25%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Using%20WEP%20in%20ad-hoc%20networks&rft.btitle=2006%20IFIP%20International%20Conference%20on%20Wireless%20and%20Optical%20Communications%20Networks&rft.au=Guyot,%20V.&rft.date=2006&rft.spage=4%20pp.&rft.epage=4&rft.pages=4%20pp.-4&rft.issn=1811-3923&rft.isbn=9781424403400&rft.isbn_list=1424403405&rft_id=info:doi/10.1109/WOCN.2006.1666575&rft_dat=%3Cieee_CHZPO%3E1666575%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-h124t-f820f49f61e5fb3c367ce4572d9e69e855e049a50ac0118a72805a1124b28c4f3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1666575&rfr_iscdi=true