Loading…
Using WEP in ad-hoc networks
Nowadays, with the normalization of the 802.11 standard and the emerging of Wi-Fi low cost devices, many testbeds use this wireless technology to realize ad-hoc networks. The 802.11 security protocol, WEP, has not been designed by security experts. It results in a flawed protocol. The secret key sha...
Saved in:
Main Author: | |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 4 |
container_issue | |
container_start_page | 4 pp. |
container_title | |
container_volume | |
creator | Guyot, V. |
description | Nowadays, with the normalization of the 802.11 standard and the emerging of Wi-Fi low cost devices, many testbeds use this wireless technology to realize ad-hoc networks. The 802.11 security protocol, WEP, has not been designed by security experts. It results in a flawed protocol. The secret key shared between all 802.11 devices can be retrieved by attackers which are passively collecting data over the wireless network. TKIP, which solves this problem by periodically refreshing the keys between the access points and the wireless clients, has been standardized. But 802.11 ad-hoc networks remain unsafe. We address the problem of security in ad-hoc environments by using smart cards to handle the actual WEP-based 802.11 networking adapters to refresh the WEP key, like TKIP does in infrastructure environments |
doi_str_mv | 10.1109/WOCN.2006.1666575 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_1666575</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1666575</ieee_id><sourcerecordid>1666575</sourcerecordid><originalsourceid>FETCH-LOGICAL-h124t-f820f49f61e5fb3c367ce4572d9e69e855e049a50ac0118a72805a1124b28c4f3</originalsourceid><addsrcrecordid>eNotj8tKA0EQAAeikBD3A0QP-wOzds-z5yhLfEAwHgw5hsmkJ9moG9kJiH-vYE51qoIS4hqhQYRwt1q0L40CcA0656y3I1EFT2iUMaANwIWYICFKHZQei6qUAwBoJCIME3G7LF2_q1ez17rr67iV-2Oqez59H4f3ciUuc_woXJ05FcuH2Vv7JOeLx-f2fi73qMxJZlKQTcgO2eaNTtr5xMZ6tQ3sApO1DCZECzEBIkWvCGzEP3ejKJmsp-Lmv9sx8_pr6D7j8LM-_-hfjJE7Wg</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Using WEP in ad-hoc networks</title><source>IEEE Xplore All Conference Series</source><creator>Guyot, V.</creator><creatorcontrib>Guyot, V.</creatorcontrib><description>Nowadays, with the normalization of the 802.11 standard and the emerging of Wi-Fi low cost devices, many testbeds use this wireless technology to realize ad-hoc networks. The 802.11 security protocol, WEP, has not been designed by security experts. It results in a flawed protocol. The secret key shared between all 802.11 devices can be retrieved by attackers which are passively collecting data over the wireless network. TKIP, which solves this problem by periodically refreshing the keys between the access points and the wireless clients, has been standardized. But 802.11 ad-hoc networks remain unsafe. We address the problem of security in ad-hoc environments by using smart cards to handle the actual WEP-based 802.11 networking adapters to refresh the WEP key, like TKIP does in infrastructure environments</description><identifier>ISSN: 1811-3923</identifier><identifier>ISBN: 9781424403400</identifier><identifier>ISBN: 1424403405</identifier><identifier>DOI: 10.1109/WOCN.2006.1666575</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access protocols ; Ad hoc networks ; Communication system security ; Costs ; Data security ; Information retrieval ; Intelligent networks ; Smart cards ; Testing ; Wireless networks</subject><ispartof>2006 IFIP International Conference on Wireless and Optical Communications Networks, 2006, p.4 pp.-4</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1666575$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,4050,4051,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1666575$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Guyot, V.</creatorcontrib><title>Using WEP in ad-hoc networks</title><title>2006 IFIP International Conference on Wireless and Optical Communications Networks</title><addtitle>WOCN</addtitle><description>Nowadays, with the normalization of the 802.11 standard and the emerging of Wi-Fi low cost devices, many testbeds use this wireless technology to realize ad-hoc networks. The 802.11 security protocol, WEP, has not been designed by security experts. It results in a flawed protocol. The secret key shared between all 802.11 devices can be retrieved by attackers which are passively collecting data over the wireless network. TKIP, which solves this problem by periodically refreshing the keys between the access points and the wireless clients, has been standardized. But 802.11 ad-hoc networks remain unsafe. We address the problem of security in ad-hoc environments by using smart cards to handle the actual WEP-based 802.11 networking adapters to refresh the WEP key, like TKIP does in infrastructure environments</description><subject>Access protocols</subject><subject>Ad hoc networks</subject><subject>Communication system security</subject><subject>Costs</subject><subject>Data security</subject><subject>Information retrieval</subject><subject>Intelligent networks</subject><subject>Smart cards</subject><subject>Testing</subject><subject>Wireless networks</subject><issn>1811-3923</issn><isbn>9781424403400</isbn><isbn>1424403405</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotj8tKA0EQAAeikBD3A0QP-wOzds-z5yhLfEAwHgw5hsmkJ9moG9kJiH-vYE51qoIS4hqhQYRwt1q0L40CcA0656y3I1EFT2iUMaANwIWYICFKHZQei6qUAwBoJCIME3G7LF2_q1ez17rr67iV-2Oqez59H4f3ciUuc_woXJ05FcuH2Vv7JOeLx-f2fi73qMxJZlKQTcgO2eaNTtr5xMZ6tQ3sApO1DCZECzEBIkWvCGzEP3ejKJmsp-Lmv9sx8_pr6D7j8LM-_-hfjJE7Wg</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Guyot, V.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2006</creationdate><title>Using WEP in ad-hoc networks</title><author>Guyot, V.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-h124t-f820f49f61e5fb3c367ce4572d9e69e855e049a50ac0118a72805a1124b28c4f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Access protocols</topic><topic>Ad hoc networks</topic><topic>Communication system security</topic><topic>Costs</topic><topic>Data security</topic><topic>Information retrieval</topic><topic>Intelligent networks</topic><topic>Smart cards</topic><topic>Testing</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Guyot, V.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEL</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Guyot, V.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Using WEP in ad-hoc networks</atitle><btitle>2006 IFIP International Conference on Wireless and Optical Communications Networks</btitle><stitle>WOCN</stitle><date>2006</date><risdate>2006</risdate><spage>4 pp.</spage><epage>4</epage><pages>4 pp.-4</pages><issn>1811-3923</issn><isbn>9781424403400</isbn><isbn>1424403405</isbn><abstract>Nowadays, with the normalization of the 802.11 standard and the emerging of Wi-Fi low cost devices, many testbeds use this wireless technology to realize ad-hoc networks. The 802.11 security protocol, WEP, has not been designed by security experts. It results in a flawed protocol. The secret key shared between all 802.11 devices can be retrieved by attackers which are passively collecting data over the wireless network. TKIP, which solves this problem by periodically refreshing the keys between the access points and the wireless clients, has been standardized. But 802.11 ad-hoc networks remain unsafe. We address the problem of security in ad-hoc environments by using smart cards to handle the actual WEP-based 802.11 networking adapters to refresh the WEP key, like TKIP does in infrastructure environments</abstract><pub>IEEE</pub><doi>10.1109/WOCN.2006.1666575</doi></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1811-3923 |
ispartof | 2006 IFIP International Conference on Wireless and Optical Communications Networks, 2006, p.4 pp.-4 |
issn | 1811-3923 |
language | eng |
recordid | cdi_ieee_primary_1666575 |
source | IEEE Xplore All Conference Series |
subjects | Access protocols Ad hoc networks Communication system security Costs Data security Information retrieval Intelligent networks Smart cards Testing Wireless networks |
title | Using WEP in ad-hoc networks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T01%3A25%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Using%20WEP%20in%20ad-hoc%20networks&rft.btitle=2006%20IFIP%20International%20Conference%20on%20Wireless%20and%20Optical%20Communications%20Networks&rft.au=Guyot,%20V.&rft.date=2006&rft.spage=4%20pp.&rft.epage=4&rft.pages=4%20pp.-4&rft.issn=1811-3923&rft.isbn=9781424403400&rft.isbn_list=1424403405&rft_id=info:doi/10.1109/WOCN.2006.1666575&rft_dat=%3Cieee_CHZPO%3E1666575%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-h124t-f820f49f61e5fb3c367ce4572d9e69e855e049a50ac0118a72805a1124b28c4f3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1666575&rfr_iscdi=true |