3rd International ICST Conference on COMmunication System SoftWAre and MiddlewaRE

Research Article

Fuzzy based Dynamic WEP keymanagement for WLAN Security Enhancement

  • @INPROCEEDINGS{10.1109/COMSWA.2008.4554449,
        author={S. Chandramathi and K,V, Arunkumar and S. Deivarayan and P. Sendhilkumar},
        title={Fuzzy based Dynamic WEP keymanagement for WLAN Security Enhancement},
        proceedings={3rd International ICST Conference on COMmunication System SoftWAre and MiddlewaRE},
        publisher={IEEE},
        proceedings_a={COMSWARE},
        year={2008},
        month={6},
        keywords={WLAN; Security; WEP key; Dynamic keymanagement; fuzzy},
        doi={10.1109/COMSWA.2008.4554449}
    }
    
  • S. Chandramathi
    K,V, Arunkumar
    S. Deivarayan
    P. Sendhilkumar
    Year: 2008
    Fuzzy based Dynamic WEP keymanagement for WLAN Security Enhancement
    COMSWARE
    IEEE
    DOI: 10.1109/COMSWA.2008.4554449
S. Chandramathi1, K,V, Arunkumar1, S. Deivarayan1, P. Sendhilkumar1
  • 1: CAD LAB., ECE Department, Pondicherry Engineering College, Pondicherry, India

Abstract

A wireless local area network (WLAN) is a flexible data communication system implemented as an extension to or as an alternative for a wired local area network (LAN). The 802.11 standard defines the Wired Equivalent Privacy (WEP) protocol and encapsulation of data frames for the purpose of security of the wireless LAN systems. It is intended to provide data privacy to the level of a wired network. WEP suffered threat of attacks from hackers owing to certain security shortcomings in the WEP protocol. Despite its shortcomings one cannot undermine the importance of WEP as it still remains the most widely used system. WEP suffers security pitfalls due to weak key management of the shared secret key and initialization vector (IV) repetitions. To overcome these problems, the existing WEP protocol is modified in this project to enhance the security of WLAN systems by dynamically changing the WEP key based on the network traffic intensity and updating it frequently based on the number of frames transmitted by using fuzzy logic which ensures message privacy as the encryption is not breached.