Vulnerabilities


Vulnerabilities in WLAN have been and will continue to be exploited. The following is a listing of the well-known attacks that exist today.

Paper from the University of California, Berkeley study (2001) that found that the IV (initialization vector), sent in plaintext, will repeat itself over time.

Security of the WEP Algorithm: http://www.gta.ufrj.br/~eric/tese/artigos/wep-faq.html

FMS Attack (Fluhrer, Mantin, and Shamir) explored shortcomings with the RC4 algorithm. WEP does not have a key rotation method, and after 100,000 to 1,000,000 packets, the IV can be broken and the WEP key derived.

"Your 802.11 Wireless Network Has No Clothes": http://www.cs.umd.edu/~waa/wireless.pdf




The Business Case for Enterprise-Class Wireless Lans
The Business Case for Enterprise-Class Wireless LANs
ISBN: 1587201259
EAN: 2147483647
Year: 2004
Pages: 163

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net