Анализ безопасности беспроводной сети
Keywords:
information security, digital technologies, Wi-Fi, WEP, WPA, WPA2, FMS, data transfer protocolsAbstract
The article discusses wireless network security protocols, their limitations and disad-vantages. An attack using a recovery key is also considered, and its effectiveness in reducing the av-erage number of intercept packets based on the selection of initialization vectors is demonstrated. A number of comparative experiments on ciphertext-only attacks were conducted to examine the effec-tiveness of such a technique and highlight the difficulties encountered.
References
Akyildiz I. F, Su W, Sankarasubramaniam Y and Cayirci E. Wireless sensor networks: a survey. Computer Networks 2002; 38:393-422.
IEEE Std 802.11a. Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. LAN/MAN Standards Committee of the IEEE Computer Society. 1999.
Rivest R. The RC4 encryption algorithm. RSA Data Security. 1992.
IEEE Std 802.11.Information Technology-Telecommunication and Information Exchange Between Systems-Local and Metropolitan Area Networks-Specific Requirements-Part 11-Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications.1997.
Edney J, William A. Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Boston: Addison-Wesley Longman Publishing Co. 2003.
Ferguson N. Michael: an improved MIC for 802.11 WEP. IEEE doc. 802.11-2/020r0. 2002.
Housley R, Whiting D, Ferguson N. Alternate Temporal Key Hash. IEEE doc. 802.11-02/282r2. 2002.
Moen V, Raddum H and Hole K J. Weaknesses in the Temporal Key Hash of WPA. Mobile Computing and Communications Review, 2001. 76-83.
Borisov N, Goldberg I and Wagner, D. Intercepting mobile communications: The insecurity of 802.11. Chez MOBICOM, Rome, Italy, 2001.
Fluhrer S, Mantin I, Shamir A. Weaknesses in the key scheduling algorithm of RC4. Chez Annual Workshop on Selected Areas in Cryptography, Toronto, CA, 2001.
Downloads
Published
How to Cite
Issue
Section
License
The author transfers for a period of 5 years to the Central Research Institute of Russian Sign Language non-exclusive rights to use the article in any form and in any way specified in Article 1270 of the Civil Code of the Russian Federation. The transfer of rights occurs at the time of downloading any materials through an automated system on this site.