Featured Paper: Wireless network security: Comparison of WEP mechanism, WPA and RSN security protocols
September 2009
In this edition of the SIGMM Records, we present some background for the paper "Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols". Of all papers that were presented at workshops and conferences that were sponsored or co-sponsored by SIG Multimedia, it was the second most downloaded paper in the third quarter of 2008. We have therefore asked the authors to describe the background of their work, their motivation, the problems in performing the research, and possible errata.
Background of the workThe decision makers, who usually decides or makes the final decision about the technological investments of a company or an organization, are supposedly non-technicals. The IT staff of a company are definitely a technical group. So there must have been a safe way of communication mechanism in between them. It is a hard task, not only for the IT staff but also for the managers to communicate mutually and understand each other thoroughly on technical issues. IT staff look for the technical aspects of the service, where the managers or decision makers look from different perspectives, as of budget constraints, strategic planning requirements, customer satisfaction, remodelling of the current infrastructure, training of personnel and most importantly internal and external opportunities and threats etc. Motivation for the workThe IT staff that works for the company and management, should produce every possible technical decision alternatives for the management. The possible alternatives that are to be put forward should have been examined thoroughly in advance. Anticipated benefits and drawbacks that are associated with each decision alternative are to be deeply interrogated. Managers are always busy and they have limited time. The most effective way for submitting decision alternatives to the management might be the comparison of the every possible technological alternative along with the weaknesses and strengths associated with it. Unless a comparison over the alternatives is done and submitted to the management, the decision process might become tedious for the management. Doing so would definitely facilitate the decision process. As one of the most popular IT service and facility, which has advantages over the traditional wired networks, wireless networks are rapidly emerging in every part of daily life. Wireless is a non-secure technology if not used with special attention to the details. There are currently three possible security mechanisms/protocols for the wireless computer networks that might be employed. The paper that we have written mainly discuss the wireless security mechanisms/protocols in this respect. On behalf of the IT staff, we have aimed to reach the non-specialist readers, namely, decision makers, managers, casual users, students and etc. in order to explain the alternative security precautions. Research Problems EncounteredWireless Equivalent Privacy (WEP) mechanism and Wi-Fi Protected Access (WPA) protocol usage was common and there were well accepted during the research period. Where an important percentage of the users employ no security over wireless networks. So technical and user feedback data over the aforementioned these two could easily be accessed. But for the Robust Security Network (RSN) protocol no usage data and no feedback were available, except for the technical draft written specifications. |
|||
|
|||
|
|||
|