CFP last date
20 January 2025
Reseach Article

Article:Design of Multithreaded Security Algorithm using Session Keys to Secure Initialization Vector(IV) for Enhancing the Wireless Protocol WEP

by D.J.Evanjaline, E. Kirubakaran
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 3 - Number 5
Year of Publication: 2010
Authors: D.J.Evanjaline, E. Kirubakaran
10.5120/732-1031

D.J.Evanjaline, E. Kirubakaran . Article:Design of Multithreaded Security Algorithm using Session Keys to Secure Initialization Vector(IV) for Enhancing the Wireless Protocol WEP. International Journal of Computer Applications. 3, 5 ( June 2010), 1-4. DOI=10.5120/732-1031

@article{ 10.5120/732-1031,
author = { D.J.Evanjaline, E. Kirubakaran },
title = { Article:Design of Multithreaded Security Algorithm using Session Keys to Secure Initialization Vector(IV) for Enhancing the Wireless Protocol WEP },
journal = { International Journal of Computer Applications },
issue_date = { June 2010 },
volume = { 3 },
number = { 5 },
month = { June },
year = { 2010 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume3/number5/732-1031/ },
doi = { 10.5120/732-1031 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:51:05.919051+05:30
%A D.J.Evanjaline
%A E. Kirubakaran
%T Article:Design of Multithreaded Security Algorithm using Session Keys to Secure Initialization Vector(IV) for Enhancing the Wireless Protocol WEP
%J International Journal of Computer Applications
%@ 0975-8887
%V 3
%N 5
%P 1-4
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The 802.11 standard defines the Wired Equivalent Privacy (WEP) and encapsulation of data frames. It is intended to provide data privacy to the level of a wired network. WEP suffered threat of attacks from hackers owing to certain security shortcomings in the WEP protocol. Lately, many new protocols like WiFi Protected Access (WPA), WPA2, Robust Secure Network (RSN) and 802.11i have come into being, yet their implementation is fairly limited. Despite its shortcomings one cannot undermine the importance of WEP as it still remains the most widely used system and we chose to address certain security issues and propose some modifications to make it more secure. In this paper we have proposed a modification to the existing WEP protocol to make it more secure. We achieve Message Privacy by ensuring that the encryption is not breached. The proposed enhancements attempt to rectify the vulnerabilities to enhance the WEP with Private IV and Session Time for improved authentication process. In the proposed algorithm we can use all possible 224 different IVs without making them predictable for an attacker, eliminates the IV collision ensuring Message Privacy that further strengthens security of the existing WEP.

References
Index Terms

Computer Science
Information Sciences

Keywords

Wireless networks security Session Time IV WEP