Wired Equivalent Privacy (WEP)
ARASH HABIBI LASHKARI
FCSIT, University of Malaya (UM)
Kuala Lumpur, Malaysia
a_habibi_l@hotmail.com
FARNAZ TOWHIDI
Computer Science Faculty, UTM City Campus
Kuala Lumpur, Malaysia
Farnaz.towhidi@gmail.com
RAHELEH SADAT HOSSEINI
Faculty of Computer Science, University of Ljubljana
Ljubljana, Slovenia
rahele_h@yahoo.com
Abstract— there are some demonstrable reasons for customers
who like use from wireless technology and this is clear because
there are various benefits for using wireless technology. The
contrast between wireless usage and security techniques
growing, show that the security is not adequate enough for this
data growing. It’s obvious that the hackers are able to monitor
the transmitted data and hack whatever they want. So we see
that these days Companies are investing more money on
securing their wireless networks. There are three major type of
security in wireless. In this paper, at first we try to completely
explain the structure of WEP as a first wireless security
technique and discuss about all versions of it. At the second
step, we discuss about all problems of WEP and finally explain
the solutions and improvements that done on this security
technique. Then we are in the next plan witch is explain the
structure of two other techniques (WPA, WPA2) and we hope
that we will publish a completely comparison among wireless
techniques in the near future.
Keywords— WEP, Wireless, Security, WLAN Protocol,
802.11
I. INTRODUCTION
The 802.11 WLAN standards specify the two lowest
layer of the OSI network model which are physical and data
link layers. The major goals of IEEE for creating these
standards were made different approach to the physical layer,
for example different frequencies, different encoding
methods, and share the same higher layers. They have
succeeded, and the Media Access Control (MAC) layers of
the 802.11a, b, and g protocols are considerably identical. At
the next higher layer still, all 802.11 WLAN protocols
specify the use of the 802.2 protocol for the logical link
control (LLC) portion of the data link layer. As you can see
in Fig.1, in the OSI model of network, such protocols as
TCP/IP, IPX, NetBEUI, and AppleTalk, still exist at higher
layers. Each layer utilizes the services of the underside
layers. “Fig. 1”
In WLANs, privacy is achieved by data contents
protection with encryption. Encryption is optional in 802.11
WLANs, but without it, any other standard wireless device,
can read all traffic in network. There have been three major
generations of security approaches, which is mentioned
below:
• WEP (Wired Equivalent Privacy)
• WPA (Wi-Fa Protected Access)
• WPA2/802.11i (Wi-Fa Protection Access, Version 2)
Each of these protocols has two generations named as
personal and enterprise template.
Fig-1: 802.11 AND OSI MODELL
II. WEP- STATIC OR PERSONAL
The Wired Equivalent Privacy (WEP) was designed to
provide the security of a wired LAN by encryption through
use of the RC4 algorithm with two side of a data
communication.
A. In the sender side:
WEP try to use from four operations to encrypt the data
(plaintext).At first, the secret key used in WEP algorithm is
2009 International Conference on Future Computer and Communication
978-0-7695-3591-3/09 $25.00 © 2009 IEEE
DOI 10.1109/ICFCC.2009.32
492
2009 International Conference on Future Computer and Communication
978-0-7695-3591-3/09 $25.00 © 2009 IEEE
DOI 10.1109/ICFCC.2009.32
492