Review On Wireless Security Protocols WE
Review On Wireless Security Protocols WE
ABSTRACT
Wireless networks have posed a threat in Data Security that has stuck to the core of data communication
between two points. Absence of inflexible security measures has made numerous organizations contribute
millions to verify their systems. Development of different security conventions for Wireless LANs has been
given in this paper. Also, vulnerabilities of WEP/WPA/WPA2/WPA3 have been discussed and how the
wireless networks are attacked using the design flaws present in these Wireless Security Protocols. The use of
different tools and programming languages used for testing the strength of the protocols. Tools like nmap,
zenmap, aircrack-ng, etc., are used in the Linux environment to practically demonstrate the attacks against
these networks using WEP/WPA/WPA2/WPA3 protocols. The solutions for the shortcomings in WEP has
been applied in WPA, similarly WPA2 and WPA3.
Keywords : Wired Equivalent Privacy, Wi-Fi Protected Access, TKIP (Temporal key Integrity Protocol),
CCMP (Counter mode with Cipher block Chaining Message Authentication Code), SAE (Simultaneous
Authentication of Equals),WPA3
CSEIT1953127 | Received : 20 June 2019 | Accepted : 10 July 2019 | July-August -2019 [ 5 (4) : 28-35 ]
28
Dr. B. Indira Reddy et al Int J Sci Res CSE & IT. July-August-2019 ; 5(4) : 28-35
act as both encryption and decryption key. In the has been made compatible with all vendors and
second step, the subsequent keys go about as a seed existing equipment. The primary concern is to defeat
for Pseudo-Random Generator (PRNG). In the Third WEP shortcoming without the change in equipment.
Step, plaintext checks for uprightness by a calculation This was finished by including (TKIP) Temporal Key
and link by the plain content once more. In the last Integrity Protocol for encryption and 802.1X EAP for
step, the result of the key sequence and ICV will go authentication purpose to offer high security. To
to the RC4 algorithm, encoded message is framed by keep away from Information Fabrication (bit
joining the Initialization Vector before the Cipher flipping), WPA presented Message Integrity Check
text. (MIC) calculation known as "Michael".
• In extension, the new PN along with the key WPA3 (Wi-Fi Protected Access 3)
identifier collectively will be employed to Wi-Fi union impelled WPA3 the cutting edge remote
fabricate the 64-bit CCMP header. security standard that can dispose of every current
• The nonce, group of temporal key, AAD and defencelessness. The key highlights of WPA3 are
MPDU information are utilized to make the Protection against brute force attacks, WPA3 Secrecy,
cipher and MIC. Protecting Open/Public Networks. WPA3 utilizes
• The encryption of MPDU is acquired by SAE (Simultaneous Authentication of Equals)
consolidating the CCMP header, unique MPDU handshake to offer Forward Secrecy, which keeps the
header, encrypted data, and MIC. offender from decoding old caught traffic. Gives
individualized data encryption a component that
encodes remote traffic to alleviate the danger of Man-
in-the-Middle-Attacks. Provides 192 -bit encryption
to Wi-Fi associations.
of Authentication messages and advances of WEP can • WEP does not anticipate replay attacks. An
be performed by using TKIP. attacker can basically record and replay packets
as wanted and they will be acknowledged as
S.Vinjosh Reddy [2] explained about cracking WEP authentic.
encryption of Wi-Fi networks So as to know about • WEP employs RC4 inappropriately. The keys
the tools used and to strengthen our Wi-Fi. utilized are frail and can be brute-forced on
standard PCs in hours to minutes, utilizing
Cracking WEP: available accessible programs.
• Client encrypts data using a key • WEP reuses initialization vectors. An assortment
• Encrypted packets are sent in the air of accessible cryptanalytic techniques that can
• Router Decrypts packets using the key decode information without obtaining the
encryption key.
Every packet is encrypted utilizing a special key • Without detection, WEP enables an attacker to
stream. change the information without obtaining the
Random Initialization Vector (IV) is employed to encryption key.
create the key stream. The initialization vector is • Key administration is insufficient and refreshing
only 24 bits. is poor.
• The issue in the RC-4 algorithm.
Enable monitor mode. • Simple producing of authentication messages.
Capture a large number of packets/IVs using
airodump-ng. Enhancements over WEP
Analyse the captured IVs and crack the key using • Improved data encryption (TKIP)
aircrack-ng. • User authentication (Use EAP Method)
If the network is too busy it may take more time to • Integrity (Michael Method)
capture enough IVs. So, force the access point to
generate new IVs. Arash Habibi Lashkari [4] gave detailed explanation
on WEP,WPA and explained the weakness and
WEP Cracking ARP Request replay improvements. Likewise, WPA2 versions, issues, and
• Wait for an ARP packet improvements that are done to explain significant
• Capture it, and replay it. shortcoming in WPA, the correlation among WEP,
• This causes the AP to produce another packet WPA, WPA2 security protocols.
with a new IV.
• Continue doing this till we have enough IVs to WPA Improvements.
break the key. • Cryptographic message integrity code to
overcome reproductions.
Arash Habibi Lashkari [3] compared WEP with • New IV sequencing system for Defeating Replay
WPA. The author defined WEP weakness and attacks.
enhancements, WPA improvements • Per Packet Key mixing capability, to de-
correspond the public IVs from feeble keys.
WEP Weakness: • Re-keying or defeating key collision attacks.
• WEP does not anticipate the fabrication of
packets.
Samia Alblwi [5] gave an overview of WPA2 and • Use Hashcat (v4.2.0 or higher) secret key
discussed about how vulnerabilities present in WEP cracking tool to get the WPA PSK (Pre-Shared
and WPA are fixed. Weakness of WPA2 are also Key) secret key.
discussed in this paper. • Decrypting may require some time relying upon
its length and complexity.
Yonglei Liu [6] presented attacking methods of
WPA/WPA2.Strategies like Brute force, TMTO brute Mathy Vanhoef [8] proposed an attack that misuses
force attacks, Brute forcing utilizing GPU, TKIP key the flaws in protocols to reuse and reinstall an as of
mixing Function, TKIP Beck&Tews, CCMP TMTO now being used key. For a fruitful attack the offender
attacks are unmistakably simplified. needs to fool the person into re-installing already in
use key, when the victim reinstalls this key related
Norazaidi Baharudin [7] referenced that management parameters like the incremental transmit packet
frames on 802.11 a/b/g/n were sent in decoded plain number (i.e nonce) and receive packet number (i.e
content, thus can be fooled and fabricated simply by replay counter) are reset to their original value.
the intruder. Wireless Intruder Detection System Basically, to ensure security, a key should just be
(WIDS) is intended to shield the wireless clients from introduced and utilized once. Unfortunately,
the de-authentication and disassociation attacks. discovered this isn't ensured by the WPA2 protocol.
WIDS screens beacon frames and differentiate the
SSID of the AP and the relegated authentic AP. WPA2 Vulnerabilities
Mahmoud Khasawneh [11] portrayed the protocols, Pranav S.Ambavkar [16] portrayed the shortcoming
such as WPA and WPA2. WPA gives client security of "Solid WPA/WPA2 Authentication" and perceive
and privacy by utilizing TKIP for encryption and that it is so straightforward to break the protocol.
Michael for data integrity. Despite the improvements New standard's WPA and WPA2 executions
given by WPA, it has some shortcomings with alongside their first minor vulnerabilities and how it
respect to the authentication and data integrity is conceivable to break.
process. New component for data integrity in WPA2
was proposed which is CCMP. Tomoaki Sato [17] proposed an agreeable WEP
algorithm to which cipher strength is increased using
Vipin Poddar's [12] paper is a near investigation of algorithm and software implementation due to which
WEP, WPA, and WPA2. To check the authentication processing rate of compatible WEP algorithm is more
of all protocols by suggesting the legendary attack high-speed than that of traditional WEP algorithm.
vector scripts i.e Air crack set of tools. The test
discovered that WEP is weakest, to which WPA was Mathy Vanhoef [18] indicated how WPA3 is
an impermanent method and WPA2 is strong with influenced by a few design flaws and review these
long haul adjustment. defects both hypothetically and practically. Clarified
how Simultaneous Authentication of Equals
Muthu Pavithran [13] plans to transmit a wireless otherwise called Dragonfly is influenced by password
penetration test and compares the encrypted key of a partitioning attacks. Likewise referenced how to
wireless network with a document that contains the alleviate their attacks in a backward-compatible way
captured packets. Additionally penetration tests in and how minor changes to the WPA3 protocol could
WEP and WPA/WPA2 protocols and furthermore have counteracted most of their attacks. The
the techniques to build up these protocols employing contributions made are:
different attacks. • Pointed out how anti-clogging mechanisms of
SAE is unable to shield denial-of-service attacks.
Kirti Rana [14] thinks about WEP and WPA • Violating the overhead of SAE’s defenses upon
encryption mechanism for better knowledge of their already-known side-channels, a resource-
working standards and security bugs. How security constrained device can load the CPU of a known
protocols validate the clients? How simple it is to Access Point (AP).
break the security protocols of wireless systems with • Performed dictionary attack against WPA3 when
a set of tools. Utilization of aircrack-ng and comm- it is running in transition mode this is done by
view tool to demonstrate methods for hacking.
downgrading the clients to WPA2 and also [2]. S.vinjosh Reddy, K.Rijutha, K.Sai Ramani, Sk
downgrade attack against SAE. Mohammad Ali, CH.Pradeep Reddy, “Wireless
• Empirically studied the probability of timing Hacking - A WiFi Hack By Cracking WEP”,
attacks against WPA3’s SAE handshake and 201O 2nd International Conference on
validated timing attacks are possible and can Education Technology and Computer (ICETC)
disclose information about the password. [3]. Arash Habibi Lashkari, Masood Mansoori, Amir
• Theoretically and practically how the recovered Seyed Danesh “Wired Equivalent Privacy
timing and cache info can be used to implement (Wep) Versus Wi-Fi Protected Access
an offline password partitioning attack which (Wpa)”2009 International Conference On
facilitates an adversary to retrieve the password Signal Processing Systems
used by the victim. [4]. Arash Habibi Lashkari, Mir Mohammad Seyed
Danesh, Behrang Samadi,”A Survey on
IV. CONCLUSION Wireless Security Protocols(WEP, WPA and
WPA2/802.11i)
In this review paper various Wireless Security [5]. Samia Alblwi, Khalil Shujaee ,”A Survey on
protocols like WEP/WPA/WPA2/WPA3 are Wireless Security Protocol WPA2”, Int'l Conf.
discussed. At first overview of WEP is given and how Security and Management | SAM'17 |
the attacks take place in WEP based networks can be [6]. Yonglei Liu, Zhigang Jin, Ying Wang, “Survey
seen. Secondly, the improvements made to on security scheme and attacking methods of
WPA/WPA2/WPA3 to overcome all types of attacks WPA/WPA2”
are discussed. Vulnerabilities of each protocol and the [7]. Norzaidi Baharudin, Fakariah Hani Mohd Ali,
improvements over the preceding are mentioned. Mohamad Yusof Darus, Norkhushaini Awang,
Though the drafting of Wireless Security Protocols is “Wireless Intruder Detection System (WIDS) in
done very efficiently and productively still there are Detecting De-Authentication and
some vulnerabilities which are seen after the Disassociation Attacks in IEEE 802.11”
implementation due to which there may be some cost [8]. Mathy Vanhoef, Frank Piessens,” Key
restrictions or hardware restrictions to apply the Reinstallation Attacks: Forcing Nonce Reuse in
patches or replace the equipment. So, the conclusion WPA2”
of this paper is that the security issues must be [9]. Dr.T.Pandikumar1, Mohammed Ali Yesuf,”Wi-
carefully kept in mind while designing the Wireless Fi Security and Test Bed Implementation for
Security Protocols as the hackers are discovering new WEP and WPA Cracking”
ways to engage. Also, we must hack our systems so as [10]. BabitaDagar, Neha Goyal,” Integrating
to point out the loopholes in our network and cover Enhanced Security Measures in
them before anyone attacks. WEP/WPA/WPA2-PSK”
[11]. Mahmoud Khasawneh, Izadeen Kajman,
V. REFERENCES Rashed Alkhudaidy, and Anwar Althubyani,” A
Survey on Wi-Fi Protocols:WPA and WPA2”
[1]. Arash Habibi Lashkari, F. Towhidi, R. S. [12]. Vipin Poddar, Hitesh Choudhary,” A
Hoseini, “Wired Equivalent Privacy(WEP)”, Comparitive Analysis Of Wireless Security
ICFCC Kuala Lumpur Conference, Published Protocols (Wep And Wpa2)”
by IEEE Computer Society, Indexed by [13]. Muthu Pavithran. S, Pavithran. S,” Advanced
THAMSON ISI, 2009. Attack Against Wireless Networks Wep,