Weaknesses and Strengths Analysis over Wireless Network Security Standards

Several wireless networks security standards have been proposed and widely implemented in both business and home environments in order to protect the network from unauthorized access. However, the implementation of such standards is usually achieved by network administrators without even knowing the standards- weaknesses and strengths. The intention of this paper is to evaluate and analyze the impact over the network-s security due to the implementation of the wireless networks security standards WEP, WPA and WLAN 802.1X.





References:
[1] E. Guillen, S. Loaiza, "An'alisis de Vulnerabilidades de Tres Est'andares de
Seguridad para Redes de A' rea Local Inala'mbricas," GISSIC Investigation
Group, Telecommunications Engineering Department, Nueva Granada
Military University, Bogot'a-Colombia, 2008.
[2] Institute of Electrical and Electronics Engineers, "IEEE Standard for
Information technology - Telecommunications and information exchange
between systems - Local and metropolitan area networks - Specific
requirements - Part 11: Wireless LAN Medium Access Control (MAC)
and Physical Layer (PHY) Specifications, 1999 Edition (R2003).
[3] C. Grogans, J. Bethea, I. Hamdan, "RC4 Encryption Algorithm," North
Carolina Agricultural and Technical State University , March 5, 2000.
[4] Wi-Fi Alliance, "Wi-Fi Protected Access: Strong, standards-based, interoperable
security for todays Wi-Fi networks," 2003.
[5] C. Rigney, S. Willens, Livingston, A. Rubens, Merit, W. Simpson,
Daydreamer, "Remote Authentication Dial In User Service (RADIUS),"
IETF RFC 2865, June 2000.
[6] J. Hassell, "RADIUS - Securing Public Access to Private Resources,"
O-Reilly & Associates, ISBN: 0596003226.
[7] K. Hamzeh, G. Pall, W. Verthein, J. Taaru, W. Little, G. Zorn, "Point-to-
Point Tunneling Protocol (PPTP)," IETF RFC 2637, July 1999.
[8] D. Stanley, J. Walker, B. Aboba, "Extensible Authentication Protocol
(EAP) Method Requirements for Wireless LANs," IETF RFC 4017,
March 2005.
[9] Institute of Electrical and Electronics Engineers, "IEEE Standard for
Information technology - Telecommunications and information exchange
between systems - Local and metropolitan area networks - Specific
requirements - Part 11: Wireless LAN Medium Access Control (MAC)
and Physical Layer (PHY) Specifications. Amendment 6: Medium Access
Control (MAC) Security Enhancements", 2003.
[10] L, Barken, "How Secure Is Your Wireless Network? Safeguarding Your
Wi-Fi LAN," Prentice Hall, ISBN: 0-13-140206-42003, pp. 224.
[11] T. Newsham, "Cracking WEP Keys. Applying known techniques to WEP
keys," @Stake, 2001, pp. 35.
[12] T. Dierks, E. Rescorla, "The Transport Layer Security (TLS) Protocol:
Version 1.2," IETF RFC 5246, August 2008.
[13] E. Rescorla, M. Ray, S. Dispensa, N. Oskov, "Transport Layer Security
(TLS) Renegotiation Indication Extension," IETF RFC 5746, February
2010.
[14] E. Guillen, D. Padilla, Y. Colorado, "Weaknesses and Strengths Analysis
over Network-based Intrusion Detection and Prevention Systems," Proceedings
of the IEEE Latin-American Conference on Communications
2009, LATINCOM -09, pp. 1-5.
[15] E. Guillen, D. Padilla, K. Martinez, "Vulnerabilities and Performance
Analysis over Fingerprint Recognition Systems," Proceedings of The
2010 World Congress in Computer Science, Computer Engineering, and
Applied Computing, WORLDCOMP10.