WEP and WPA Improvement
Mustafa ElGili, Samani A. Talab, Awad H. Ali
DOI: 10.4236/wsn.2010.23032   PDF   HTML     6,338 Downloads   12,404 Views   Citations


This paper aims to describe a solution to improve wireless network security protocols WEP and WPA based on a modified RC4 algorithm for encryption, and based on initialization vector (IV) with secret key for a session key exchange, and new mutual authentication mechanism.

Share and Cite:

M. ElGili, S. Talab and A. Ali, "WEP and WPA Improvement," Wireless Sensor Network, Vol. 2 No. 3, 2010, pp. 239-242. doi: 10.4236/wsn.2010.23032.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] “WEP fix using RC4 fast packet keying,” February 2002, http://www.rsasecurity.com/rsalabs/technotes/wep-fix.html.
[2] S. Jariwala, “Enhancing wireless security with WPA,” April 2004.
[3] A. Jain and S. Karan, “Wireless LAN security”.
[4] M. S. Ahmad and V. Ramachandran, “Cafe latte with a free topping of cracked WEP—retrieving WEP keys from road warriors”.
[5] M. O. Pervaiz, M. Cardei, and J. Wu, “Security in wireless local area networks,” Department of Computer Science & Engine.
[6] D. Kalina, “WAP, WPA, and EAP,” March 2005, http://islab.oregonstate.edu/koc/ece478/05Report/Kalina.doc
[7] T. Takahashi, “WPA passive dictionary attack overview,” http://www.personalwireless.org/tools/WPA-Cracker/WPA_Passive Dictionary_Attack_Overview.pdf
[8] V. Moen, H. Raddum, and K. J. Hole, “Weaknesses in the Temporal Key Hash of WPA,” http://bora.uib.no/bitstream/1956/1901/21/Paper4 Moen.pdf
[9] H. R. Hassan and Y. Challal, “Enhanced WEP: An efficient solution to WEP threats”.
[10] W. Stallings, “Cryptography and network security,” 3rd edition, 1999.
[11] J.-C. Lin, Y.-H. Kao, and C.-W. Yang “Secure enhanced wireless transfer protocol,” First International Conference on Availability, Reliability and Security, 2006.
[12] A. Klein, “Attacks on the RC4 stream cipher,” 27 February 2007.

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.