A parctical approach to secure WLANs for SOHO and enterprises

Though several security solutions for WLAN are available in the market and we can mix them together to strengthen the security more, but as data packets are transmitted in the air, it is always insecure. In case of a most secured SOHO setup that is proposed here, the worst case can be: A hacker have...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Munshi, A. Q., Sadique, S. F., Mishu, M.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 4
container_issue
container_start_page 1
container_title
container_volume
creator Munshi, A. Q.
Sadique, S. F.
Mishu, M.
description Though several security solutions for WLAN are available in the market and we can mix them together to strengthen the security more, but as data packets are transmitted in the air, it is always insecure. In case of a most secured SOHO setup that is proposed here, the worst case can be: A hacker have to intercept the packets to break the WPA2/WPA key first. In this case, he needs to use the dictionary attack using rainbow table and selecting a complex key pass-phrase will make the hacker to give a lot of effort. A proper selection of pass-phrase may even lead the hacker to use a server grade processing setup to break the key. After the successful breaking of the key, still the hacker will have to scan for a valid MAC that is associated with that AP and will have to change his MAC with the newly collected one. In a low user/traffic concentrated WLAN, collecting of around 50,000 IVs will become very time consuming for the hacker.
doi_str_mv 10.1109/ICWITS.2012.6417786
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6417786</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6417786</ieee_id><sourcerecordid>6417786</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-8fd4c2d9881b7c96555dfa68afcff097a6a41b3c491128902ccd3be096c9bef3</originalsourceid><addsrcrecordid>eNo1j7FOwzAURY0QElDyBV38Ayl-iWP7DQxRBDRSRIZG6lg5L7YIKk1kh4G_pxLtdHWHc48uY2sQGwCBz3W1r7vdJhOQbZQErY26YQlqA1LpXKA06pY9Xos29yyJ8UsIcaa1AHxgLyWfbaBlJHvkdp7DZOmTLxOPjn6C4_um_IjcT4Hv2m3L7Wng7rS4MIcxuvjE7rw9RpdccsW6t9eu2qZN-15XZZOOoIslNX6QlA1oDPSaUBVFMXirjPXkvUBtlZXQ5yQRIDMoMqIh751ARdg7n6_Y-n92dM4dzupvG34Pl8P5H6HMSVM</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A parctical approach to secure WLANs for SOHO and enterprises</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Munshi, A. Q. ; Sadique, S. F. ; Mishu, M.</creator><creatorcontrib>Munshi, A. Q. ; Sadique, S. F. ; Mishu, M.</creatorcontrib><description>Though several security solutions for WLAN are available in the market and we can mix them together to strengthen the security more, but as data packets are transmitted in the air, it is always insecure. In case of a most secured SOHO setup that is proposed here, the worst case can be: A hacker have to intercept the packets to break the WPA2/WPA key first. In this case, he needs to use the dictionary attack using rainbow table and selecting a complex key pass-phrase will make the hacker to give a lot of effort. A proper selection of pass-phrase may even lead the hacker to use a server grade processing setup to break the key. After the successful breaking of the key, still the hacker will have to scan for a valid MAC that is associated with that AP and will have to change his MAC with the newly collected one. In a low user/traffic concentrated WLAN, collecting of around 50,000 IVs will become very time consuming for the hacker.</description><identifier>ISBN: 1467309478</identifier><identifier>ISBN: 9781467309479</identifier><identifier>EISBN: 9781467309486</identifier><identifier>EISBN: 1467309486</identifier><identifier>EISBN: 9781467309462</identifier><identifier>EISBN: 146730946X</identifier><identifier>DOI: 10.1109/ICWITS.2012.6417786</identifier><language>eng</language><publisher>IEEE</publisher><subject>Communication system security ; Computer hacking ; Educational institutions ; Filtering ; IEEE 802.11 Standards ; Wireless LAN</subject><ispartof>2012 IEEE International Conference on Wireless Information Technology and Systems (ICWITS), 2012, p.1-4</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6417786$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6417786$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Munshi, A. Q.</creatorcontrib><creatorcontrib>Sadique, S. F.</creatorcontrib><creatorcontrib>Mishu, M.</creatorcontrib><title>A parctical approach to secure WLANs for SOHO and enterprises</title><title>2012 IEEE International Conference on Wireless Information Technology and Systems (ICWITS)</title><addtitle>ICWITS</addtitle><description>Though several security solutions for WLAN are available in the market and we can mix them together to strengthen the security more, but as data packets are transmitted in the air, it is always insecure. In case of a most secured SOHO setup that is proposed here, the worst case can be: A hacker have to intercept the packets to break the WPA2/WPA key first. In this case, he needs to use the dictionary attack using rainbow table and selecting a complex key pass-phrase will make the hacker to give a lot of effort. A proper selection of pass-phrase may even lead the hacker to use a server grade processing setup to break the key. After the successful breaking of the key, still the hacker will have to scan for a valid MAC that is associated with that AP and will have to change his MAC with the newly collected one. In a low user/traffic concentrated WLAN, collecting of around 50,000 IVs will become very time consuming for the hacker.</description><subject>Communication system security</subject><subject>Computer hacking</subject><subject>Educational institutions</subject><subject>Filtering</subject><subject>IEEE 802.11 Standards</subject><subject>Wireless LAN</subject><isbn>1467309478</isbn><isbn>9781467309479</isbn><isbn>9781467309486</isbn><isbn>1467309486</isbn><isbn>9781467309462</isbn><isbn>146730946X</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1j7FOwzAURY0QElDyBV38Ayl-iWP7DQxRBDRSRIZG6lg5L7YIKk1kh4G_pxLtdHWHc48uY2sQGwCBz3W1r7vdJhOQbZQErY26YQlqA1LpXKA06pY9Xos29yyJ8UsIcaa1AHxgLyWfbaBlJHvkdp7DZOmTLxOPjn6C4_um_IjcT4Hv2m3L7Wng7rS4MIcxuvjE7rw9RpdccsW6t9eu2qZN-15XZZOOoIslNX6QlA1oDPSaUBVFMXirjPXkvUBtlZXQ5yQRIDMoMqIh751ARdg7n6_Y-n92dM4dzupvG34Pl8P5H6HMSVM</recordid><startdate>201211</startdate><enddate>201211</enddate><creator>Munshi, A. Q.</creator><creator>Sadique, S. F.</creator><creator>Mishu, M.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201211</creationdate><title>A parctical approach to secure WLANs for SOHO and enterprises</title><author>Munshi, A. Q. ; Sadique, S. F. ; Mishu, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-8fd4c2d9881b7c96555dfa68afcff097a6a41b3c491128902ccd3be096c9bef3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Communication system security</topic><topic>Computer hacking</topic><topic>Educational institutions</topic><topic>Filtering</topic><topic>IEEE 802.11 Standards</topic><topic>Wireless LAN</topic><toplevel>online_resources</toplevel><creatorcontrib>Munshi, A. Q.</creatorcontrib><creatorcontrib>Sadique, S. F.</creatorcontrib><creatorcontrib>Mishu, M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Munshi, A. Q.</au><au>Sadique, S. F.</au><au>Mishu, M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A parctical approach to secure WLANs for SOHO and enterprises</atitle><btitle>2012 IEEE International Conference on Wireless Information Technology and Systems (ICWITS)</btitle><stitle>ICWITS</stitle><date>2012-11</date><risdate>2012</risdate><spage>1</spage><epage>4</epage><pages>1-4</pages><isbn>1467309478</isbn><isbn>9781467309479</isbn><eisbn>9781467309486</eisbn><eisbn>1467309486</eisbn><eisbn>9781467309462</eisbn><eisbn>146730946X</eisbn><abstract>Though several security solutions for WLAN are available in the market and we can mix them together to strengthen the security more, but as data packets are transmitted in the air, it is always insecure. In case of a most secured SOHO setup that is proposed here, the worst case can be: A hacker have to intercept the packets to break the WPA2/WPA key first. In this case, he needs to use the dictionary attack using rainbow table and selecting a complex key pass-phrase will make the hacker to give a lot of effort. A proper selection of pass-phrase may even lead the hacker to use a server grade processing setup to break the key. After the successful breaking of the key, still the hacker will have to scan for a valid MAC that is associated with that AP and will have to change his MAC with the newly collected one. In a low user/traffic concentrated WLAN, collecting of around 50,000 IVs will become very time consuming for the hacker.</abstract><pub>IEEE</pub><doi>10.1109/ICWITS.2012.6417786</doi><tpages>4</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 1467309478
ispartof 2012 IEEE International Conference on Wireless Information Technology and Systems (ICWITS), 2012, p.1-4
issn
language eng
recordid cdi_ieee_primary_6417786
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Communication system security
Computer hacking
Educational institutions
Filtering
IEEE 802.11 Standards
Wireless LAN
title A parctical approach to secure WLANs for SOHO and enterprises
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-21T05%3A17%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20parctical%20approach%20to%20secure%20WLANs%20for%20SOHO%20and%20enterprises&rft.btitle=2012%20IEEE%20International%20Conference%20on%20Wireless%20Information%20Technology%20and%20Systems%20(ICWITS)&rft.au=Munshi,%20A.%20Q.&rft.date=2012-11&rft.spage=1&rft.epage=4&rft.pages=1-4&rft.isbn=1467309478&rft.isbn_list=9781467309479&rft_id=info:doi/10.1109/ICWITS.2012.6417786&rft_dat=%3Cieee_6IE%3E6417786%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781467309486&rft.eisbn_list=1467309486&rft.eisbn_list=9781467309462&rft.eisbn_list=146730946X&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6417786&rfr_iscdi=true