Computer Science – Information Theory
Scientific paper
2009-08-17
Computer Science
Information Theory
5 pages, invited to ITW'09
Scientific paper
Inspired by our earlier work on Automatic Repeat reQuest (ARQ) secrecy, we propose a simple, yet efficient, security overlay protocol to existing 802.11 networks. Our work targets networks secured by the Wired Equivalent Privacy (WEP) protocol because of its widespread use and vulnerability to a multitude of security threats. By exploiting the existing ARQ protocol in the 802.11 standard, our proposed opportunistic secrecy scheme is shown to defend against all known passive WEP attacks. Moreover, our implementation on the madwifi-ng driver is used to establish the achievability of a vanishing secrecy outage probability in several realistic scenarios.
Gamal Hesham El
Omar Yara
Youssef Moustafa
No associations
LandOfFree
ARQ Secrecy: From Theory to Practice does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with ARQ Secrecy: From Theory to Practice, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and ARQ Secrecy: From Theory to Practice will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-19452