This work presents a new approach of securing a
wireless network. The configuration is focused on securing &
Protecting wireless network traffic for a small network such as a
home or dorm room. The security Mechanism provided both
authentication, allowing only known authorized users access to the
wireless network, and encryption, preventing anyone from reading
the wireless traffic. The mentioned solution utilizes the open source
free S/WAN software which implements the Internet Protocol
Security –IPSEC. In addition to wireless components, wireless NIC
in PC and wireless access point needs a machine running Linux to act
as security gateway. While the current configuration assumes that the
wireless PC clients are running Linux, Windows XP/VISTA/7 based
machines equipped with VPN software which will allow to interface
with this configuration.
[1] S. Fluhrer, I. Mantin, and A. Shamir. Weaknesses in the key scheduling
algorithm of RC4. In Eighth Annual Workshop on Selected Areas in
Cryptography, Toronto, Canada, Aug. 2001
[2] N. Borisov, I. Goldberg, and D.Wagner. Intercepting mobile
communications: The insecurity of 802.11. MOBICOM 2001 (2001)
[3] S. Kent and R. Atkinson. Security Architecture for the Internet Protocol.
RFC 2401. The Internet Society, November 1998. http://www.rfceditor.
org
[4] R. Thayer, N. Doraswamy, and R. Glenn. IP Security Document
Roadmap. RFC 2411. The Internet Society, November 1998.
http://www.rfc-editor.org
[5] D. Harkins, and D. Carrel. The Internet Key Exchange (IKE). RFC 2409.
The Internet Society, November 1998. http://www.rfc-editor.org
[6] D. Maughan, M. Schertler, M. Schneider, and J. Turner. Internet
Security Association and Key Management Protocol (ISAKMP). RFC
2408. The Internet Society, November 1998. http://www.rfc-editor.org
[7] S. Kent and R. Atkinson. IP Encapsulating Security Payload (ESP). RFC
2406. The Internet Society, November 1998. http://www.rfc-editor.org
[8] C. Brian Grimm. Wi-fi Protected Access - Overview. Wi-Fi Alliance.
2002http://www.wi-fi.org/OpenSection/pdf/Wi-
Fi_Protected_Access_Overview.pdf. Viewed Nov. 7, 2002
[1] S. Fluhrer, I. Mantin, and A. Shamir. Weaknesses in the key scheduling
algorithm of RC4. In Eighth Annual Workshop on Selected Areas in
Cryptography, Toronto, Canada, Aug. 2001
[2] N. Borisov, I. Goldberg, and D.Wagner. Intercepting mobile
communications: The insecurity of 802.11. MOBICOM 2001 (2001)
[3] S. Kent and R. Atkinson. Security Architecture for the Internet Protocol.
RFC 2401. The Internet Society, November 1998. http://www.rfceditor.
org
[4] R. Thayer, N. Doraswamy, and R. Glenn. IP Security Document
Roadmap. RFC 2411. The Internet Society, November 1998.
http://www.rfc-editor.org
[5] D. Harkins, and D. Carrel. The Internet Key Exchange (IKE). RFC 2409.
The Internet Society, November 1998. http://www.rfc-editor.org
[6] D. Maughan, M. Schertler, M. Schneider, and J. Turner. Internet
Security Association and Key Management Protocol (ISAKMP). RFC
2408. The Internet Society, November 1998. http://www.rfc-editor.org
[7] S. Kent and R. Atkinson. IP Encapsulating Security Payload (ESP). RFC
2406. The Internet Society, November 1998. http://www.rfc-editor.org
[8] C. Brian Grimm. Wi-fi Protected Access - Overview. Wi-Fi Alliance.
2002http://www.wi-fi.org/OpenSection/pdf/Wi-
Fi_Protected_Access_Overview.pdf. Viewed Nov. 7, 2002
@article{"International Journal of Electrical, Electronic and Communication Sciences:63997", author = "Amir Rashid and M. Saleem Khan and Freeha Zafar", title = "A New Approach of Wireless Network Traffic on VPN", abstract = "This work presents a new approach of securing a
wireless network. The configuration is focused on securing &
Protecting wireless network traffic for a small network such as a
home or dorm room. The security Mechanism provided both
authentication, allowing only known authorized users access to the
wireless network, and encryption, preventing anyone from reading
the wireless traffic. The mentioned solution utilizes the open source
free S/WAN software which implements the Internet Protocol
Security –IPSEC. In addition to wireless components, wireless NIC
in PC and wireless access point needs a machine running Linux to act
as security gateway. While the current configuration assumes that the
wireless PC clients are running Linux, Windows XP/VISTA/7 based
machines equipped with VPN software which will allow to interface
with this configuration.", keywords = "Wireless network security, security network,
authentication, encryption and internet protocol security.", volume = "5", number = "5", pages = "693-6", }