By Topic

Wireless security & privacy

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
M. Borsc ; Cummins Coll. Of Eng. For Women, Pune, India ; H. Shinde

Internet enabled wireless devices continue to proliferate and are expected to surpass traditional Internet clients in the near future. This has opened up new exciting opportunities in the mobile e-commerce market. Data security and privacy is the major concern in the current generation of "wireless Web" offerings. The physical security of wireless devices, Bluetooth security, WAP security, higher-level security protocols like SSL are known. In this article, the WEP algorithm is discussed. The IEEE 802.11 standard defines WEP i.e., wired equivalent privacy. WEP is designed to provide data privacy to the level of a wired network. 802.11 designed WEP is not able to achieve this goal. But WEP could achieve this by migrating from 40 bit to 104 or 128 bit RC4 keys. Privacy cannot be obtained with WEP encapsulation just by increasing key size. Even if key size is 1 into 1000 bit it does not affect the security of WEP encapsulation or if any other stream cipher which replaces RC4.

Published in:

2005 IEEE International Conference on Personal Wireless Communications, 2005. ICPWC 2005.

Date of Conference:

23-25 Jan. 2005