Computer Science – Cryptography and Security
Scientific paper
2011-03-02
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 3, No. 1, February 2011 ISSN:0975-3834 (Online); 0975-4679 (P
Computer Science
Cryptography and Security
8 pages, 3 tables
Scientific paper
10.5121/ijwmn.2011.3101
This study aims to assess wireless network security holistically and attempts to determine the weakest link among the parts that comprise the 'secure' aspect of the wireless networks: security protocols, wireless technologies and user habits. The assessment of security protocols is done by determining the time taken to break a specific protocol's encryption key, or to pass an access control by using brute force attack techniques. Passphrase strengths as well as encryption key strengths ranging from 40 to 256 bits are evaluated. Different scenarios are planned and created for passphrase generation, using different character sets and different number of characters. Then each scenario is evaluated based on the time taken to break that passphrase. At the end of the study, it is determined that the choice of the passphrase is the weakest part of the entire 802.11 wireless security system.
Tanrikulu Zuhal
Tasoluk Berker
No associations
LandOfFree
A Weakest Chain Approach to Assessing the Overall Effectiveness of the 802.11 Wireless Network Security does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with A Weakest Chain Approach to Assessing the Overall Effectiveness of the 802.11 Wireless Network Security, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and A Weakest Chain Approach to Assessing the Overall Effectiveness of the 802.11 Wireless Network Security will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-474826