A Weakest Chain Approach to Assessing the Overall Effectiveness of the 802.11 Wireless Network Security

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

8 pages, 3 tables

Scientific paper

10.5121/ijwmn.2011.3101

This study aims to assess wireless network security holistically and attempts to determine the weakest link among the parts that comprise the 'secure' aspect of the wireless networks: security protocols, wireless technologies and user habits. The assessment of security protocols is done by determining the time taken to break a specific protocol's encryption key, or to pass an access control by using brute force attack techniques. Passphrase strengths as well as encryption key strengths ranging from 40 to 256 bits are evaluated. Different scenarios are planned and created for passphrase generation, using different character sets and different number of characters. Then each scenario is evaluated based on the time taken to break that passphrase. At the end of the study, it is determined that the choice of the passphrase is the weakest part of the entire 802.11 wireless security system.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

A Weakest Chain Approach to Assessing the Overall Effectiveness of the 802.11 Wireless Network Security does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with A Weakest Chain Approach to Assessing the Overall Effectiveness of the 802.11 Wireless Network Security, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and A Weakest Chain Approach to Assessing the Overall Effectiveness of the 802.11 Wireless Network Security will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-474826

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.