Security In Wireless LANS And MANS (Artech House Computer Security)

Editorial Reviews. About the Author. Thomas Hardjono is a Principal Scientist in the CTO Office at VeriSign, Inc., Mountain View, CA. He is also the coauthor of.
Table of contents

OFB operates on plain text in away similar to stream cipher that will be described below, where the encryption key used in every step depends on the encryption key from the previous step Stream Cipher Stream cipher functions on a stream of data by operating on it bit by bit. Stream cipher consists of two major components: Mixing function is usually just an XOR function, while key stream generator is the main unit in stream cipher encryption technique. For example, if the key stream generator produces a series of zeros, the outputted ciphered stream will be identical to the original plain text.

A common IV between the sender and the receiver is usually imposed to keep both of them synchronized. The IV can be auto-generated or incremented on each packet, which depends on the capabilities of the system. The stream cipher technique can be categorized into two modes: Stream Mode the "simple" mode operates on the both sender and receiver sides.

The sender uses only the base shared key to encrypt the outgoing stream, on the other side the receiver decrypts the stream using the same key. The main disadvantage of this method is that if the base key gets known the whole system is compromised. The other mode is called Self-Synchronizing Stream Cipher. The previous states number is fixed and defined by the algorithm. Self- Synchronizing method is more secure than the previous mode, but it is slower.

Bestselling Series

Mode Stream cipher has a well known advantage over block cipher because of its speed and simplicity of analysis. But in the same time it is a known fact that stream cipher is less secure than block cipher. That's why most of the recommendation of today's standards recommends using block cipher techniques over stream cipher ones 2. In this section we will describe briefly some of the well known and used encryption standards.

Moreover we will mention the key features and disadvantages of each standard. It is based on the IBM proposed algorithm called Lucifer.


  • Dawn of Night: The Erevis Cale Trilogy, Book II: 2.
  • Reforms at Risk: What Happens After Major Policy Changes Are Enacted (Princeton Studies in American !
  • Security in Wireless LANs and MANs?
  • 1-3 John MacArthur New Testament Commentary (Macarthur New Testament Commentary Serie)!
  • Eternally Grounded.
  • A Short History of England [Illustrated]!
  • Doomed Queens: Royal Women Who Met Bad Ends, From Cleopatra to Princess Di!

DES became a standard in Since that time, many attacks and methods recorded that exploit the weaknesses of DEC, which made it an insecure block cipher. In this standard the encryption method is similar to the one in original DES but applied 3 times to increase the encryption level. But it is a known fact that 3DES is slower than other block cipher methods. Rijndael pronounced Rain Doll algorithm was selected in after a competition to select the best encryption standard.

Security In Wireless LANS And MANS Artech House Computer Security

Brute force attack is the only effective attack known against it, in which the attacker tries to test all the characters combinations to unlock the encryption. It is used with SSL Secure socket Layer , which is used to secure identification information and money transfers over the Internet.


  1. Security in wireless LANs and MANs / Thomas Hardjono, Lakshminath R. Dondeti - Details - Trove.
  2. Nobility of Spirit: A Forgotten Ideal?
  3. Security in wireless LANs and MANs (Book, ) [leondumoulin.nl].
  4. Security In Wireless LANS And MANS (Artech House Computer Security).
  5. Environmental Policy Convergence in Europe: The Impact of International Institutions and Trade?
  6. Security in Wireless LANs and MANs : Thomas Hardjono : .
  7. Hawkes Lady;
  8. RC4 showed that is secure enough for certain systems, but it was found out that it does not offer that level of security to wireless communications, making it fall short for many security standards. The main reason behind this fast adaptation is due to the nature of wireless networks where it provides the flexibility and freedom that wired networks lack. The increasing of bandwidth capabilities has inspired people to think seriously about replacing wired networks with wireless networks especially in places where it is hard or expensive to have wired networks.

    One of the main places that can benefit from these ideas are rural areas, where wired networks infrastructure is either difficult or impossible to create due to physical obstacles. The main standards in the wireless world are: These two wireless networks are usually known by two acronyms: This medium is electromagnetic waves which are mainly either radio frequency RF or infrared frequency IR.

    Wireless LANs consist mainly of two entities: Clients' are equipped with devices that allow the user to use the RF medium to communicate with other wireless devices. AP functions like a regular switch or router in wired network for the wireless devices. Moreover, it represents a gateway between the wireless devices and a wired network.

    When these devices try to communicate among themselves they propagate their data through the AP device. This set is created by chaining this group of BSSs to a single backbone system. The idea is very similar to a TV broadcast network shown in Fig.

    The main target of implementing WiMAX technology is to provide a convenient solution to the "last mile access", where the fast data backbone traffic is to be distributed among consumers. This also helps expand the Internet covered areas especially in rural areas. This difference made the burden of securing the network heavier. The broadcast nature of wireless networks makes it easy for everyone to attack the. The exponential growth of wireless networks add another obstacle on enhancing the network security.

    People tend to keep things the way they are instead of doing what is right. Also such enhancement of security is expensive in terms of time, money and effort that many users do not have or wish not to spend. Below is a list of the most common attack types known in both wired and wireless networks. Most of the security attacks and threats are listed under the following categories: Traffic Analysis In this type of attacks the attacker uses the statistics of network connectivity and activity to find information about the attacked network.

    Passive Eavesdropping Attackers in this type set themselves in sniffing mode, where they listen to all the network traffic hoping to extract information from it. This type of attack is only useful with unencrypted networks and stream cipher encrypted ones. Active Eavesdropping Similar to passive eavesdropping but the attacker tries to change the data on the packet, or to inject a complete packet in the stream of data.

    Unauthorized Access This type of attack is also known by many other names, such as war driving, war walking, and war flying. This is the most common attack type where the attacker tries to get access to a network that she is not authorized to access. Mainly the reason behind such attacks is just to get Internet access for free. Man-in-the-middle Attacks In this attack, the attacker gets the packets before the intended receiver does.

    Security in wireless LANs and MANs

    This allows her to change the content of the message. One of the most known subset of this attack is called ARP Address Resolution Protocol attacks, where the attacker redirects network traffic to pass through her device. Session High-Jacking The attacker attacks the integrity of the session by trying to hijack an authorized session from an authorized user. In this paper we reviewed how security and privacy in wireless data networks has evolved over the last years. We have discussed also how the difference in the data transfer medium between wired and wireless networks plays a key role in exposing the system to more possible attacks.

    Security hazards will always be around, they can only be avoided if the correct policies and standards are used. Only the future can tell us if the current standards are secure as they promise. Moreover, we mentioned some of the ways that can be utilized to improve the security of the wireless networks. PANA the new protocol proposed to work as a messaging protocol between network clients and network access authority was discussed.

    Security still evolves and it will remain a hot topic as long as there are ways to threaten data security. Replay Attacks In this type of attack the attacker uses the information from previous authenticated sessions to gain access to the network. This will make people confused and sometimes they may connect to this false AP exposing their information to it. This can be solved by imposing mutual authentication between AP and network devices.

    Attackers use frequency devices to send continuous noise on a specific channel to ruin network connectivity. It is known in the wireless world as RF Jamming. There are many other threats that can be placed under one of the categories above. These different types of attacks make it harder for the standard regulators to find the best way to come up with the best solutions to the security hazards without sacrificing network usability or speed.

    Security in Wireless LANs and MANs - Thomas Hardjono, Lakshminath R. Dondeti - Google Книги

    In this section we discussed the common concepts in security, the wireless world and the common security attacks against networks in both wired and wireless networks. This section should have provided enough information to go through the following sections. First of all my sincere gratitude to HOD Prof. Gurav, for his constant encouragement. Understanding the Digital World Brian W. Cryptography and Network Security: Security Engineering Ross J. Linux Server Security Chris Binnie. Attacking Network Protocols James Forshaw. Data and Goliath Bruce Schneier.

    Social Engineering Christopher Hadnagy. The Perfect Weapon David E. Black Hat Python Justin Seitz. Hacking Exposed 7 Joel Scambray. Digital Resilience Ray Rothrock. No Place to Hide Glenn Greenwald.

    Find a copy online

    Surveillance Valley Yasha Levine. The Attention Merchants Tim Wu. Serious Cryptography Jean-Philippe Aumasson. The Lure Stephen Schroeder. Screen Resolution Brett Lee. The Art of Intrusion Kevin D. Computer Security William Stallings. Hiding from the Internet Michael Bazzell. Network Security and Cryptography Sarhan M.