To search, Click below search items.


All Published Papers Search Service


A Dual Layered Encryption Algorithm for Wireless Equivalent Privacy (WEP) Algorithm


Olufade, F. W. Onifade, Adenike, O. Osofisan, Chukwuzitere, U. OBODO


Vol. 8  No. 5  pp. 264-271


Wired Equivalent Privacy (WEP) protocol was adopted to protect authorized users from unauthorized access and eavesdropping in the IEEE 802.11 wireless LANs (WLAN). However, it had been proven that the WEP protocol fails to provide data confidentiality and authentication [2, 14]. The WEP provides encrypted communication using an encryption key between the client station and Access point (AP). All client stations and APs on a network use the same key to encrypt and decrypt data. The key resides on both the client station and the AP [14]. The above rendered the WEP protocol naked to major forms of attack. Thus in this paper a keyed-message authentication code aimed at preventing an intruder from tampering with packets in transit is proposed, with a revised authentication scheme to avoid authentication spoofing and reduce replay attacks. We also employed private IV scheme alongside the use of day and session keys that counters several attacks. The proposed WEP was tested with HTTPNet and TelnetNet with each client having their respective sessions. Finally, simulation methodology is presented, with the simulated results provided. Our studies show that the enhanced model provides better data confidentiality.


IEEE 802.11, Security, Wired Equivalent Privacy, Wireless LANs (WLAN), Integrity Check Value (ICV)