Skip to main content

Security in Wireless Local Area Networks

  • Chapter
Wireless Network Security

Abstract

Wireless Local Area Networks (WLAN) allow end users to wirelessly access Internet with great convenience at home, work, or in public places. WLANs are currently being widely deployed in our real life with great success. However, it is still in its infant stage as long as security is concerned. In this chapter, we briefly overview the security issues in the Wireless Local Area Networks (WLAN). After a short introduction to the background of WLAN, we present WLAN security requirements and categories of current real-worldWLAN attacks. We then describe some details of several representative WLAN security protocols such as WEP, WPA, WPA2, and WAPI. We also survey security issues of the WLAN access points such as rogue access points and evil twin attacks. Finally, we overview other security mechanisms that can be used to enhance WLAN security, including Wireless Firewalls, Wireless VPN, and Wireless IDS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baiamonte V, Papagiannaki K, Iannaccone G, Torino P (2007) Detecting 802.11 wireless hosts from remote passive observations. In Proc. IFIP/TC6 Networking.

    Google Scholar 

  2. Beck M, Tews E (2009) Practical attacks against WEP and WPA. In Proceedings of the 2nd ACM Conference on Wireless Network Security (WiSec).

    Google Scholar 

  3. Bittau A, Handley M, Lackey J (2006) The Final Nail in WEPs Coffin. In IEEE Symposium on Security and Privacy.

    Google Scholar 

  4. Corbett C, Beyah R, Copeland J (2006) A passive approach to wireless NIC identification. In IEEE International Conference on Communications (ICC’06).

    Google Scholar 

  5. Cui A, Stolfo S (2010) A Quantitative Analysis of the Insecurity of Embedded Network Devices: Results of a Wide-Area Scan. In Annual Computer Security Applications Conference (ACSAC’10).

    Google Scholar 

  6. Fluhrer S, Mantin I, Shamir A (2001) Weaknesses in the Key Scheduling Algorithm of RC4. In Lecture Notes in Computer Science, 2259: 1C24.

    MathSciNet  Google Scholar 

  7. Han H, Sheng B, Tan C, Li Q, Lu S (2009) A Measurement Based Rogue AP DetectionScheme. In IEEE International Conference on Computer Communications (INFOCOM 2009).

    Google Scholar 

  8. He C, Mitchel J (2005) Security Analysis and Improvements for IEEE 802.11i. In Proceedings of the Network and Distributed System Security Symposium (NDSS’05).

    Google Scholar 

  9. Ilyas M, Ahson S (2005) Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards (Internet and Communications). CRC Press.

    Google Scholar 

  10. Jana S, Kasera S (2008) On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews. In The Annual International Conference on Mobile Computing and Networking (MobiCom08).

    Google Scholar 

  11. Ma L, Teymorian A, Cheng X (2008) A hybrid rogue access point protection framework for commodity Wi-Fi networks. In Proc. IEEE INFOCOM 2008.

    Google Scholar 

  12. Mano C, Blaich A, Liao Q, Jiang Y, Cieslak D, Salyers D, Striegel A (2008) RIPPS: Rogue identifying packet payload slicer detecting unauthorized wireless hosts through network traffic conditioning. ACM Transactions on Information and System Security (TISSEC), 11(2): 1–23.

    Article  Google Scholar 

  13. Moen V, Raddum H, Hole K (2004) Weaknesses in the Temporal Key Hash of WPA. In Mobile Computing and Communications Review, pp. 76C83.

    Google Scholar 

  14. Moskowitz R (2003) Weakness in Passphrase Choice inWPA Interface. http://wifinetnews.com/archives/2003/11/weakness in passphrase choice in wpainterface.html. Accessed 10 November, 2011.

    Google Scholar 

  15. Pervaiz M, Cardei M, Wu J (2008) Security in Wireless Local Area Networks, Proceedings of Y. Xiao and Y. Pan (eds.). Security in Distributed and Networking Systems, World Scientific Publishing Co Inc.

    Google Scholar 

  16. Shetty S, Song M, Ma L (2007) Rogue access point detection by analyzing network traffic characteristics. In IEEE Military Communications Conference (MILCOM’07).

    Google Scholar 

  17. Song Y, Yang C, Gu G (2010) Who Is Peeping at Your Passwords at Starbucks?-To Catch an Evil Twin Access Point. In Proceedings of the 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’10).

    Google Scholar 

  18. Srilasak S, Wongthavarawat K, Phonphoem A (2008) Integrated Wireless Rogue Access Point Detection and Counterattack System. In International Conference on Information Security and Assurance, pp. 326–331.

    Google Scholar 

  19. Vladimirov A, Gavrilenko K, Mikhailovsky A (2008) Wi-Foo: The Secrets of Wireless Hacking. Addison-Wesley Professional, Boston.

    Google Scholar 

  20. Walker J (2005) 802.11 Security Series Part II: The Temporal Key Integrity Protocol (TKIP). http://jcbserver.uwaterloo.ca/cs436/handouts/miscellaneous/Intel Wireless 2.pdf. Accessed 10 November, 2011.

    Google Scholar 

  21. Wei W, Jaiswal S, Kurose J, Towsley D (2006) Identifying 802.11 traffic from passive measurements using iterative Bayesian inference. In Proc. IEEE INFOCOM’06.

    Google Scholar 

  22. Wei W, Suh K, Wang B, Gu Y, Kurose J, Towsley D (2007) Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs. In Proceedings of the 7th ACM SIGCOMM conference on Internet measurement (IMC’07).

    Google Scholar 

  23. Wexler J (2010) 2009 Wireless LAN State-of-the-Market Report. http://www.webtorials.com/content/2010/03/2009-wlan-sotm.html. Accessed 10 November, 2011.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Higher Education Press, Beijing and Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Yang, C., Gu, G. (2013). Security in Wireless Local Area Networks. In: Wireless Network Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36511-9_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36511-9_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36510-2

  • Online ISBN: 978-3-642-36511-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics