Abstract
Wireless Local Area Networks (WLAN) allow end users to wirelessly access Internet with great convenience at home, work, or in public places. WLANs are currently being widely deployed in our real life with great success. However, it is still in its infant stage as long as security is concerned. In this chapter, we briefly overview the security issues in the Wireless Local Area Networks (WLAN). After a short introduction to the background of WLAN, we present WLAN security requirements and categories of current real-worldWLAN attacks. We then describe some details of several representative WLAN security protocols such as WEP, WPA, WPA2, and WAPI. We also survey security issues of the WLAN access points such as rogue access points and evil twin attacks. Finally, we overview other security mechanisms that can be used to enhance WLAN security, including Wireless Firewalls, Wireless VPN, and Wireless IDS.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Baiamonte V, Papagiannaki K, Iannaccone G, Torino P (2007) Detecting 802.11 wireless hosts from remote passive observations. In Proc. IFIP/TC6 Networking.
Beck M, Tews E (2009) Practical attacks against WEP and WPA. In Proceedings of the 2nd ACM Conference on Wireless Network Security (WiSec).
Bittau A, Handley M, Lackey J (2006) The Final Nail in WEPs Coffin. In IEEE Symposium on Security and Privacy.
Corbett C, Beyah R, Copeland J (2006) A passive approach to wireless NIC identification. In IEEE International Conference on Communications (ICC’06).
Cui A, Stolfo S (2010) A Quantitative Analysis of the Insecurity of Embedded Network Devices: Results of a Wide-Area Scan. In Annual Computer Security Applications Conference (ACSAC’10).
Fluhrer S, Mantin I, Shamir A (2001) Weaknesses in the Key Scheduling Algorithm of RC4. In Lecture Notes in Computer Science, 2259: 1C24.
Han H, Sheng B, Tan C, Li Q, Lu S (2009) A Measurement Based Rogue AP DetectionScheme. In IEEE International Conference on Computer Communications (INFOCOM 2009).
He C, Mitchel J (2005) Security Analysis and Improvements for IEEE 802.11i. In Proceedings of the Network and Distributed System Security Symposium (NDSS’05).
Ilyas M, Ahson S (2005) Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards (Internet and Communications). CRC Press.
Jana S, Kasera S (2008) On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews. In The Annual International Conference on Mobile Computing and Networking (MobiCom08).
Ma L, Teymorian A, Cheng X (2008) A hybrid rogue access point protection framework for commodity Wi-Fi networks. In Proc. IEEE INFOCOM 2008.
Mano C, Blaich A, Liao Q, Jiang Y, Cieslak D, Salyers D, Striegel A (2008) RIPPS: Rogue identifying packet payload slicer detecting unauthorized wireless hosts through network traffic conditioning. ACM Transactions on Information and System Security (TISSEC), 11(2): 1–23.
Moen V, Raddum H, Hole K (2004) Weaknesses in the Temporal Key Hash of WPA. In Mobile Computing and Communications Review, pp. 76C83.
Moskowitz R (2003) Weakness in Passphrase Choice inWPA Interface. http://wifinetnews.com/archives/2003/11/weakness in passphrase choice in wpainterface.html. Accessed 10 November, 2011.
Pervaiz M, Cardei M, Wu J (2008) Security in Wireless Local Area Networks, Proceedings of Y. Xiao and Y. Pan (eds.). Security in Distributed and Networking Systems, World Scientific Publishing Co Inc.
Shetty S, Song M, Ma L (2007) Rogue access point detection by analyzing network traffic characteristics. In IEEE Military Communications Conference (MILCOM’07).
Song Y, Yang C, Gu G (2010) Who Is Peeping at Your Passwords at Starbucks?-To Catch an Evil Twin Access Point. In Proceedings of the 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’10).
Srilasak S, Wongthavarawat K, Phonphoem A (2008) Integrated Wireless Rogue Access Point Detection and Counterattack System. In International Conference on Information Security and Assurance, pp. 326–331.
Vladimirov A, Gavrilenko K, Mikhailovsky A (2008) Wi-Foo: The Secrets of Wireless Hacking. Addison-Wesley Professional, Boston.
Walker J (2005) 802.11 Security Series Part II: The Temporal Key Integrity Protocol (TKIP). http://jcbserver.uwaterloo.ca/cs436/handouts/miscellaneous/Intel Wireless 2.pdf. Accessed 10 November, 2011.
Wei W, Jaiswal S, Kurose J, Towsley D (2006) Identifying 802.11 traffic from passive measurements using iterative Bayesian inference. In Proc. IEEE INFOCOM’06.
Wei W, Suh K, Wang B, Gu Y, Kurose J, Towsley D (2007) Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs. In Proceedings of the 7th ACM SIGCOMM conference on Internet measurement (IMC’07).
Wexler J (2010) 2009 Wireless LAN State-of-the-Market Report. http://www.webtorials.com/content/2010/03/2009-wlan-sotm.html. Accessed 10 November, 2011.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Higher Education Press, Beijing and Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Yang, C., Gu, G. (2013). Security in Wireless Local Area Networks. In: Wireless Network Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36511-9_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-36511-9_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36510-2
Online ISBN: 978-3-642-36511-9
eBook Packages: Computer ScienceComputer Science (R0)