Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Performance Evaluation of WEP with CRC32 and MD5 Using NS2 Simulator


Affiliations
1 Department of Information Technology, Ferozepur College of Engineering and Technology, India
     

   Subscribe/Renew Journal


The wireless LANs (WLANs) have become more prevalent and are widely deployed in many places such as corporate office Conference rooms, industrial warehouses, campus, residences, cafe etc. The IEEE 802.11-based WLAN presents new challenges for network administrators and information security administrators. The security of a WLAN is very important, especially for applications hosting valuable information.. This work critically reviews main security flaws of WEP, including short IV, key reuse, poor key management and suggests a new approach of automatic key management and refreshing of WEP key so that attacker could not have sufficient time to guess the key . By replacing the CRC32 With the MD5 Hash Function to enhance the Security of WLAN's and data integrity. In this current work we are implementing the MD5 Hash technique in the WEP and securing the data from the dictionary attack.

Keywords

WEP, CRC32, MD5, EAPOL, AODV, EED, PDF.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 248

PDF Views: 3




  • Performance Evaluation of WEP with CRC32 and MD5 Using NS2 Simulator

Abstract Views: 248  |  PDF Views: 3

Authors

Mandeep Kumar
Department of Information Technology, Ferozepur College of Engineering and Technology, India

Abstract


The wireless LANs (WLANs) have become more prevalent and are widely deployed in many places such as corporate office Conference rooms, industrial warehouses, campus, residences, cafe etc. The IEEE 802.11-based WLAN presents new challenges for network administrators and information security administrators. The security of a WLAN is very important, especially for applications hosting valuable information.. This work critically reviews main security flaws of WEP, including short IV, key reuse, poor key management and suggests a new approach of automatic key management and refreshing of WEP key so that attacker could not have sufficient time to guess the key . By replacing the CRC32 With the MD5 Hash Function to enhance the Security of WLAN's and data integrity. In this current work we are implementing the MD5 Hash technique in the WEP and securing the data from the dictionary attack.

Keywords


WEP, CRC32, MD5, EAPOL, AODV, EED, PDF.