Home Wireless Security and Privacy: A Practical Protocol Mixing
#1

Abstract
With the rising of wireless technologies, a lot ofwireless devices have started to reach the domestic domain.Most of them are intended to simplify common tasks avoidingthe use of cables. Home users buy wireless devices because oftheir simplicity and because they are way more practical. Butfew people think of their data privacy and security. They feelsave behind their home walls without knowing that anyonewill be able to listen to their wireless traffic without notice. Isour privacy compromised? Are our home connectionssecured? How can we ensure nobody is hacking our traffic?This and other several related questions are beginning toconcern the home users. In an effort to put everythingtogether, this document is intended to show the wirelesstechnologies that coexist nowadays in the domestic domain,and how they affect the home privacy and security. Thus, themain output of this paper is to explore the lines to follow in away to build a much secure environment, through thedefinition of a framework for a protocol mixing system.Keywords- WLAN, Wireless hacking, Information security
I. INTRODUCTION
ONG time ago when the first Wi-Fi standardsappeared, nobody would preview such a developmentof this technology. It was 1999, the 802.11a/b standard wasapproved and the first Wi-Fi products begin to reach themarket at speeds up to 11Mbps [1]. However two years laterin 2001, a security flaw was discovered in the WEPencryption method used by both standards [2, 3]. The noticewas a bad hit for the industry because it came just when thetechnology was reaching the domestic ambit along with theintegration of DSL lines.These facts lead to develop of a new security protocol toovercome the issues caused by the weakness of the WEP. Itwas called WPA (Wi-Fi Protected Access) and it wasconsidered a temporary encryption protocol while the802.11i standard was finally prepared. Meanwhile the firstreliable Bluetooth standard 802.15.1 was released in 2002,allowing the creation of the first Bluetooth devices usingthe 1.1 definition.Later in 2004 the final revision of 802.11i was approved,allowing the creation of the new WPA2. This protocolprovided better security than the older WPA because it usedthe AES encryption system rather than the more vulnerableRC4 TKIP system. Although the improvement in securityterms, the old pre-2004 equipment was incompatible withthe new standard and users were forced to upgrade theirdevices which in most cases was not possible.In the middle of this cross-over technology a new securityflaws were discovered inside the Bluetooth standard [9].The Blue Bug was the most famous of them, and allowed anattacker to access any Bluetooth device without permission.Thousands of products were affected by these issues,compromising once again the home privacy. All themanufacturers were aware that users wouldn’t be willing tochange their recently bought equipment, so that gave timeto develop a new revision.But the Wi-Fi privacy didn’t last that longer. In the late2005 a security flaw was discovered in the WPA protocolthat enabled an attacker to use a dictionary or brute forceattack to retrieve the password used to access the Wi-Finetwork [8]. Although it was only practical with short orwell known passwords, the impact in home wirelesssecurity was enormous. The new equipments implementingWPA2 were still beginning to reach the market, and withthe Bluetooth still in danger, and the WPA almost broken,the home privacy was in great compromise.Fortunately in late 2007 the 2.1 Bluetooth standard cameto solve the problems of previous definitions. Minorsecurity bugs were still practical to explode but in factBluetooth seemed to be secured for the moment. However,Wi-Fi was still vulnerable and in 2008 investigations finallyproved the weakness of the WPA-TKIP protocol by usingseveral attacks not based on dictionary or brute force attack[4]. This kind of attacks are currently under improvementor development as on 2009, and all home users are stronglyrecommended to switch to WPA2-AES protocol [13, 14],which for now, is the most secure protocol implemented inthe domestic devices. But AES design requires specific andmore powerful hardware which means more expensiveequipment, and many home users don’t want to update theirold equipment.The content of the present paper is organized as follows.Sections II, III describe the present status of the homewireless security; Sections IV and V focus the problems


Download full report
http://doi.ieeecomputersociety10.1109/AICT.2010.23
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: agitation and mixing pdf, abstract of advanced wireless home security systemmer, home wireless security, wireless home security system, wireless security for home, ppt on home security using wireless, wireless security protocol comparison**n in rcc,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Military combat robot wireless controlled. Camera helps keeping an eye on border. seminar class 6 11,384 09-06-2017, 10:27 AM
Last Post: jaseela123d
  DESIGN AND IMPLEMENTATION OF GOLAY ENCODER AND DECODER computer science crazy 2 23,607 26-08-2016, 03:46 PM
Last Post: anasek
  WORMHOLE ATTACK DETECTION IN WIRELESS ADHOC SENSOR NETWORKS seminar class 7 19,055 17-08-2016, 09:23 AM
Last Post: jaseela123d
  Wireless Communication – ZigBee / Bluetooth / RF / IR based major projects for ECE project topics 9 19,300 16-07-2016, 03:45 PM
Last Post: jaseela123d
  Wireless based Automatic dam water level control shutter open /closed with emergency smart paper boy 4 11,450 11-09-2015, 02:00 PM
Last Post: seminar report asees
  Multiuser SMS Based Wireless Electronic Notice Board seminar class 4 5,801 20-05-2015, 01:33 PM
Last Post: seminar report asees
  Home appliance control by mobile phone (DTMF) seminar class 17 18,989 10-01-2015, 10:05 PM
Last Post: seminar report asees
  Micro Controller based Security System using Sonar seminar projects crazy 3 3,652 28-09-2014, 05:50 PM
Last Post: Guest
  wireless charging of mobile phones using microwaves ramki86 33 21,580 05-08-2014, 09:29 PM
Last Post: seminar report asees
  SMS Based Wireless Electronic Notice Board using GSM/CDMA/3G Mobile Phone seminar class 20 18,363 30-04-2014, 10:43 PM
Last Post: ShawnHasson

Forum Jump: