A parctical approach to secure WLANs for SOHO and enterprises
Though several security solutions for WLAN are available in the market and we can mix them together to strengthen the security more, but as data packets are transmitted in the air, it is always insecure. In case of a most secured SOHO setup that is proposed here, the worst case can be: A hacker have...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 4 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Munshi, A. Q. Sadique, S. F. Mishu, M. |
description | Though several security solutions for WLAN are available in the market and we can mix them together to strengthen the security more, but as data packets are transmitted in the air, it is always insecure. In case of a most secured SOHO setup that is proposed here, the worst case can be: A hacker have to intercept the packets to break the WPA2/WPA key first. In this case, he needs to use the dictionary attack using rainbow table and selecting a complex key pass-phrase will make the hacker to give a lot of effort. A proper selection of pass-phrase may even lead the hacker to use a server grade processing setup to break the key. After the successful breaking of the key, still the hacker will have to scan for a valid MAC that is associated with that AP and will have to change his MAC with the newly collected one. In a low user/traffic concentrated WLAN, collecting of around 50,000 IVs will become very time consuming for the hacker. |
doi_str_mv | 10.1109/ICWITS.2012.6417786 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6417786</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6417786</ieee_id><sourcerecordid>6417786</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-8fd4c2d9881b7c96555dfa68afcff097a6a41b3c491128902ccd3be096c9bef3</originalsourceid><addsrcrecordid>eNo1j7FOwzAURY0QElDyBV38Ayl-iWP7DQxRBDRSRIZG6lg5L7YIKk1kh4G_pxLtdHWHc48uY2sQGwCBz3W1r7vdJhOQbZQErY26YQlqA1LpXKA06pY9Xos29yyJ8UsIcaa1AHxgLyWfbaBlJHvkdp7DZOmTLxOPjn6C4_um_IjcT4Hv2m3L7Wng7rS4MIcxuvjE7rw9RpdccsW6t9eu2qZN-15XZZOOoIslNX6QlA1oDPSaUBVFMXirjPXkvUBtlZXQ5yQRIDMoMqIh751ARdg7n6_Y-n92dM4dzupvG34Pl8P5H6HMSVM</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A parctical approach to secure WLANs for SOHO and enterprises</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Munshi, A. Q. ; Sadique, S. F. ; Mishu, M.</creator><creatorcontrib>Munshi, A. Q. ; Sadique, S. F. ; Mishu, M.</creatorcontrib><description>Though several security solutions for WLAN are available in the market and we can mix them together to strengthen the security more, but as data packets are transmitted in the air, it is always insecure. In case of a most secured SOHO setup that is proposed here, the worst case can be: A hacker have to intercept the packets to break the WPA2/WPA key first. In this case, he needs to use the dictionary attack using rainbow table and selecting a complex key pass-phrase will make the hacker to give a lot of effort. A proper selection of pass-phrase may even lead the hacker to use a server grade processing setup to break the key. After the successful breaking of the key, still the hacker will have to scan for a valid MAC that is associated with that AP and will have to change his MAC with the newly collected one. In a low user/traffic concentrated WLAN, collecting of around 50,000 IVs will become very time consuming for the hacker.</description><identifier>ISBN: 1467309478</identifier><identifier>ISBN: 9781467309479</identifier><identifier>EISBN: 9781467309486</identifier><identifier>EISBN: 1467309486</identifier><identifier>EISBN: 9781467309462</identifier><identifier>EISBN: 146730946X</identifier><identifier>DOI: 10.1109/ICWITS.2012.6417786</identifier><language>eng</language><publisher>IEEE</publisher><subject>Communication system security ; Computer hacking ; Educational institutions ; Filtering ; IEEE 802.11 Standards ; Wireless LAN</subject><ispartof>2012 IEEE International Conference on Wireless Information Technology and Systems (ICWITS), 2012, p.1-4</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6417786$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6417786$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Munshi, A. Q.</creatorcontrib><creatorcontrib>Sadique, S. F.</creatorcontrib><creatorcontrib>Mishu, M.</creatorcontrib><title>A parctical approach to secure WLANs for SOHO and enterprises</title><title>2012 IEEE International Conference on Wireless Information Technology and Systems (ICWITS)</title><addtitle>ICWITS</addtitle><description>Though several security solutions for WLAN are available in the market and we can mix them together to strengthen the security more, but as data packets are transmitted in the air, it is always insecure. In case of a most secured SOHO setup that is proposed here, the worst case can be: A hacker have to intercept the packets to break the WPA2/WPA key first. In this case, he needs to use the dictionary attack using rainbow table and selecting a complex key pass-phrase will make the hacker to give a lot of effort. A proper selection of pass-phrase may even lead the hacker to use a server grade processing setup to break the key. After the successful breaking of the key, still the hacker will have to scan for a valid MAC that is associated with that AP and will have to change his MAC with the newly collected one. In a low user/traffic concentrated WLAN, collecting of around 50,000 IVs will become very time consuming for the hacker.</description><subject>Communication system security</subject><subject>Computer hacking</subject><subject>Educational institutions</subject><subject>Filtering</subject><subject>IEEE 802.11 Standards</subject><subject>Wireless LAN</subject><isbn>1467309478</isbn><isbn>9781467309479</isbn><isbn>9781467309486</isbn><isbn>1467309486</isbn><isbn>9781467309462</isbn><isbn>146730946X</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1j7FOwzAURY0QElDyBV38Ayl-iWP7DQxRBDRSRIZG6lg5L7YIKk1kh4G_pxLtdHWHc48uY2sQGwCBz3W1r7vdJhOQbZQErY26YQlqA1LpXKA06pY9Xos29yyJ8UsIcaa1AHxgLyWfbaBlJHvkdp7DZOmTLxOPjn6C4_um_IjcT4Hv2m3L7Wng7rS4MIcxuvjE7rw9RpdccsW6t9eu2qZN-15XZZOOoIslNX6QlA1oDPSaUBVFMXirjPXkvUBtlZXQ5yQRIDMoMqIh751ARdg7n6_Y-n92dM4dzupvG34Pl8P5H6HMSVM</recordid><startdate>201211</startdate><enddate>201211</enddate><creator>Munshi, A. Q.</creator><creator>Sadique, S. F.</creator><creator>Mishu, M.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201211</creationdate><title>A parctical approach to secure WLANs for SOHO and enterprises</title><author>Munshi, A. Q. ; Sadique, S. F. ; Mishu, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-8fd4c2d9881b7c96555dfa68afcff097a6a41b3c491128902ccd3be096c9bef3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Communication system security</topic><topic>Computer hacking</topic><topic>Educational institutions</topic><topic>Filtering</topic><topic>IEEE 802.11 Standards</topic><topic>Wireless LAN</topic><toplevel>online_resources</toplevel><creatorcontrib>Munshi, A. Q.</creatorcontrib><creatorcontrib>Sadique, S. F.</creatorcontrib><creatorcontrib>Mishu, M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Munshi, A. Q.</au><au>Sadique, S. F.</au><au>Mishu, M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A parctical approach to secure WLANs for SOHO and enterprises</atitle><btitle>2012 IEEE International Conference on Wireless Information Technology and Systems (ICWITS)</btitle><stitle>ICWITS</stitle><date>2012-11</date><risdate>2012</risdate><spage>1</spage><epage>4</epage><pages>1-4</pages><isbn>1467309478</isbn><isbn>9781467309479</isbn><eisbn>9781467309486</eisbn><eisbn>1467309486</eisbn><eisbn>9781467309462</eisbn><eisbn>146730946X</eisbn><abstract>Though several security solutions for WLAN are available in the market and we can mix them together to strengthen the security more, but as data packets are transmitted in the air, it is always insecure. In case of a most secured SOHO setup that is proposed here, the worst case can be: A hacker have to intercept the packets to break the WPA2/WPA key first. In this case, he needs to use the dictionary attack using rainbow table and selecting a complex key pass-phrase will make the hacker to give a lot of effort. A proper selection of pass-phrase may even lead the hacker to use a server grade processing setup to break the key. After the successful breaking of the key, still the hacker will have to scan for a valid MAC that is associated with that AP and will have to change his MAC with the newly collected one. In a low user/traffic concentrated WLAN, collecting of around 50,000 IVs will become very time consuming for the hacker.</abstract><pub>IEEE</pub><doi>10.1109/ICWITS.2012.6417786</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 1467309478 |
ispartof | 2012 IEEE International Conference on Wireless Information Technology and Systems (ICWITS), 2012, p.1-4 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6417786 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Communication system security Computer hacking Educational institutions Filtering IEEE 802.11 Standards Wireless LAN |
title | A parctical approach to secure WLANs for SOHO and enterprises |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-21T05%3A17%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20parctical%20approach%20to%20secure%20WLANs%20for%20SOHO%20and%20enterprises&rft.btitle=2012%20IEEE%20International%20Conference%20on%20Wireless%20Information%20Technology%20and%20Systems%20(ICWITS)&rft.au=Munshi,%20A.%20Q.&rft.date=2012-11&rft.spage=1&rft.epage=4&rft.pages=1-4&rft.isbn=1467309478&rft.isbn_list=9781467309479&rft_id=info:doi/10.1109/ICWITS.2012.6417786&rft_dat=%3Cieee_6IE%3E6417786%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781467309486&rft.eisbn_list=1467309486&rft.eisbn_list=9781467309462&rft.eisbn_list=146730946X&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6417786&rfr_iscdi=true |