Title
Burglarproof Wep Protocol On Wireless Infrastructure
Abstract
With the popularization of wireless network, security issue is more and more important. When IEEE 802.11i draft proposed TKIP, it is expected to improve WEP (Wired Equivalent Privacy) on both active and passive attack methods. Especially in generating and management of secret keys, TKIP uses more deliberative attitude to distribute keys. Besides, it just upgrades software to accomplish these functions without changing hardware equipments. However, implementing TKIP on the exiting equipment, the transmission performance is decreased dramatically. This article presents a new scheme, Burglarproof WEP Protocol (BWP), that encrypt WEP key twice to improve the security drawbacks of original WEP, and have better performance on transmission. The proposed method is focus on modifying encryption sets to improve the low performance of TKIP, and provides better transmission rate without losing security anticipations base on current hardware configuration.
Year
Venue
Keywords
2006
PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS 2006, SECTIONS 1-8
WLAN, IEEE 802.11 Family, WEP, TKIP, BWP
Field
DocType
Citations 
Temporal Key Integrity Protocol,Lightweight Extensible Authentication Protocol,Wireless network,Wireless,Computer science,Computer security,Computer network,Encryption,Software,Wired Equivalent Privacy,Passive attack
Conference
0
PageRank 
References 
Authors
0.34
1
2
Name
Order
Citations
PageRank
Jin-Cherng Lin113616.88
Yu-Hsin Kao291.29