Security Loopholes Of 802.11 Wireless LANs And Their Solutions

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - June Issue 2013 by IJCTT Journal
Volume-4 Issue-6                           
Year of Publication : 2013
Authors :Shikha Goswami, Sangeeta Thakral

MLA

Shikha Goswami, Sangeeta Thakral "Security Loopholes Of 802.11 Wireless LANs And Their Solutions"International Journal of Computer Trends and Technology (IJCTT),V4(6):1809-1815 June Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: - The major concern in Wireless LANs is security. So in this Paper to fix security loopholes a public key authentication and key-establishment procedure has been proposed which fixes security loopholes in current standard. The public key cryptosystem is used to establish a session key securely between the client and Access point. A client -Agent based Rouge Access point detection system was developed to counter the threat of Rouge Access points in wireless LANs and are difficult to handle at the protocol level. Hence a centralized RAP was developed for organization where the area is quite large to cover manually or form a single location. An algorithm was also developed to detect Evil-Twin Access points, which cannot be detected by traditional methods. The algorithm works on fact that the evil-twin is placed at a distance from the good-twin to prevent direct detection.

 

References-
[1] William A. Arbaugh, “Wireless security is different” Computer, Vol.1, pp.99-101, April 2003.
[2] William A. Arbaugh and Shankar, “Your 802.11 Wireless Network has No Cloths,” Wireless Communication, IEEE, vol.9, pp.44-51, December 2002.
[3] B.Brown,“802.11: the security differences between band I,”IEEE Potentials,vol22, pp.22- 27,April 2003.
[4] Branch, J., Petroni Jr., N,Van Doorn, L and Safford, D. “Autonomic 802.11 Wireless LAN Security Auditing.” IEEE Security & Privacy, May/June 2004, pp56-65.
[5] Wei, W.; Jaiswal, S. ; Kurose, J ; Towsley, D. ”Identifying 802.11 Traffic from passive Measurement Using Iterative Bayesian Inference.” In Proceedings of INFOCOM, 2006
[6] Shetty, Sachin ; Song, Min ; Ma Larin., ”Rogue Access Point Detection by Analyzing Network traffic Characteristics,” Military Communication Conference, 2007. MILCOM 2007. IEEE, vol.,1. Pp.1-7,29-31, Oct.2007
[7] Wireless LAN Medium Across Control (MAC) AND Physical Layer (PHY) Specification, ANSI/IEEE Std 802.11, 2007.
[8] Johnny Cache and Vincent Liu, Hacking Exposed Wireless:Wireless Security Secrets Solutions, Osborne, McGraw-Hill, 2007.
[9] Sriram, V.S.S.; Sahoo, G.; Agrawal, K.K., “Detecting and Eliminating Rogue Access Points in IEEE-802.11 WLAN-a multi-agent sourcing Methodology,”Advance Computing Conference 2010 IEEE 2nd International, pp.256-260, 19-20 Feb 2010.
[10] Li Wang ; Sriniwasan, B ;Analysis and Improvements over DoS Attacks against IEEE 802.11i Standard,” Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010 Second International Conference, vol no-2, pp.109-113, 24-25 April 2010.

Keywords -802.11, wireless LANs, threats, loopholes