DocumentCode :
2242787
Title :
An integrated security model for WLAN
Author :
Odhiambo, Ondiwa Nashon ; Biermann, E. ; Noel, G.
Author_Institution :
French South Africa Tech. Inst. of Electron. (FSATIE), Tshwane Univaersity of Technol., Pretoria, South Africa
fYear :
2009
fDate :
23-25 Sept. 2009
Firstpage :
1
Lastpage :
6
Abstract :
IEEE802.11 wireless local area networks (WLAN) are widely deployed as extension to corporate wired LAN infrastructures. The implication of including WLAN as part of the computing infrastructure means more critical information and data is carried over the air. The threats of intrusion and denial of service is real since wireless networks have broadcasted traffic. IEEE 802.11 defines WEP, WPA and WPA2 security protocols as possible countermeasures. The most recent model defined by IEEE, the WPA2, emphasizes data confidentiality, integrity and authentication but pays little attention to availability issues. Management and control frames in WPA2 are still sent in clear making the model vulnerable to DoS attacks. The failure recovery processes requires reauthentication and reassociation a fact which makes the model easily exploited by various DoS attacks. WPA2, defines a hybrid network that implements both WEP and TKIP together with WPA2 which creates a vulnerability called security level roll back attack thus making the strong confidentiality and integrity measures in WPA2 be as weak as WEP. In this paper, we propose an integrated security model (ISM) that incorporates a drop policy to defend against DoS attacks. We assume the use of CCMP to provide confidentiality and integrity and use EAP-TTLS/802.11x with RADIUS to provide authentication. We use simulation in OPNET to show that our security model performs better to provide improved security in terms of confidentiality, integrity, authenticity and availability.
Keywords :
computer network management; cryptographic protocols; data integrity; data privacy; message authentication; telecommunication security; telecommunication traffic; wireless LAN; DoS attack; EAP-TTLS/802.11x; IEEE802.11 WLAN; WEP security protocol; WPA2 management; WPA2 security protocol; Wi-Fi protected access; broadcasted traffic; data authentication; data confidentiality; data integrity; failure recovery process; integrated security model; wired LAN infrastructure; wired equivalent privacy; wireless local area network; Authentication; Broadcasting; Communication system traffic control; Computer crime; Data security; Information security; Local area networks; Traffic control; Wireless LAN; Wireless networks; Denial of service; Security; attacks; authentication; availabiliyt; management frames; threats;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
AFRICON, 2009. AFRICON '09.
Conference_Location :
Nairobi
Print_ISBN :
978-1-4244-3918-8
Electronic_ISBN :
978-1-4244-3919-5
Type :
conf
DOI :
10.1109/AFRCON.2009.5308183
Filename :
5308183
Link To Document :
بازگشت