A review on WEP wireless security protocol

Muhammad Juwaini, Raed Alsaqour, Maha Abdelhaq, Ola Alsukour

Research output: Contribution to journalArticle

5 Citations (Scopus)

Abstract

WEP (Wired Equivalent Protocol) is a wireless security protocol ratified by IEEE (The Institute of Electrical and Electronics Engineers) in 1999. Since then, WEP is widely used in telecommunication field. In daily usage, it had been phased-out by IEEE since 2005 to be replaced by WPA/WPA2 (Wi-Fi Protected Access). WEP encryption algorithm can be easily cracked because of its widely documented weaknesses. Nevertheless, WEP is still has been used extensively as a research topic in the academic field. Certain enterprises still using WEP due to lack of security consciousness, economical constraint or because it is difficult to replace the legacy communication devices in which WEP is already bulged. In this paper, we give a review on WEP wireless security protocol in terms of its history, weaknesses, improvements, and current alternative approaches to overcome its weaknesses regarding the protocol in ICT (Information and Communication Technology) field. This research aims to address WEP protocol in its current versions and to give a spirit future direction research to enhance its security mechanism.

Original languageEnglish
Pages (from-to)39-43
Number of pages5
JournalJournal of Theoretical and Applied Information Technology
Volume40
Issue number1
Publication statusPublished - 2012

Fingerprint

Security Protocols
Network protocols
Review
Electronics
Electronic equipment
Wi-Fi
Information and Communication Technology
Engineers
Telecommunications
Communication
Encryption
Cryptography
Telecommunication

Keywords

  • Rivest cipher 4 (RC4)
  • Wired equivalent protocol (WEP)
  • Wireless security

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Juwaini, M., Alsaqour, R., Abdelhaq, M., & Alsukour, O. (2012). A review on WEP wireless security protocol. Journal of Theoretical and Applied Information Technology, 40(1), 39-43.

A review on WEP wireless security protocol. / Juwaini, Muhammad; Alsaqour, Raed; Abdelhaq, Maha; Alsukour, Ola.

In: Journal of Theoretical and Applied Information Technology, Vol. 40, No. 1, 2012, p. 39-43.

Research output: Contribution to journalArticle

Juwaini, M, Alsaqour, R, Abdelhaq, M & Alsukour, O 2012, 'A review on WEP wireless security protocol', Journal of Theoretical and Applied Information Technology, vol. 40, no. 1, pp. 39-43.
Juwaini M, Alsaqour R, Abdelhaq M, Alsukour O. A review on WEP wireless security protocol. Journal of Theoretical and Applied Information Technology. 2012;40(1):39-43.
Juwaini, Muhammad ; Alsaqour, Raed ; Abdelhaq, Maha ; Alsukour, Ola. / A review on WEP wireless security protocol. In: Journal of Theoretical and Applied Information Technology. 2012 ; Vol. 40, No. 1. pp. 39-43.
@article{9a3276f5b9854745bbd981ee067c71b0,
title = "A review on WEP wireless security protocol",
abstract = "WEP (Wired Equivalent Protocol) is a wireless security protocol ratified by IEEE (The Institute of Electrical and Electronics Engineers) in 1999. Since then, WEP is widely used in telecommunication field. In daily usage, it had been phased-out by IEEE since 2005 to be replaced by WPA/WPA2 (Wi-Fi Protected Access). WEP encryption algorithm can be easily cracked because of its widely documented weaknesses. Nevertheless, WEP is still has been used extensively as a research topic in the academic field. Certain enterprises still using WEP due to lack of security consciousness, economical constraint or because it is difficult to replace the legacy communication devices in which WEP is already bulged. In this paper, we give a review on WEP wireless security protocol in terms of its history, weaknesses, improvements, and current alternative approaches to overcome its weaknesses regarding the protocol in ICT (Information and Communication Technology) field. This research aims to address WEP protocol in its current versions and to give a spirit future direction research to enhance its security mechanism.",
keywords = "Rivest cipher 4 (RC4), Wired equivalent protocol (WEP), Wireless security",
author = "Muhammad Juwaini and Raed Alsaqour and Maha Abdelhaq and Ola Alsukour",
year = "2012",
language = "English",
volume = "40",
pages = "39--43",
journal = "Journal of Theoretical and Applied Information Technology",
issn = "1992-8645",
publisher = "Asian Research Publishing Network (ARPN)",
number = "1",

}

TY - JOUR

T1 - A review on WEP wireless security protocol

AU - Juwaini, Muhammad

AU - Alsaqour, Raed

AU - Abdelhaq, Maha

AU - Alsukour, Ola

PY - 2012

Y1 - 2012

N2 - WEP (Wired Equivalent Protocol) is a wireless security protocol ratified by IEEE (The Institute of Electrical and Electronics Engineers) in 1999. Since then, WEP is widely used in telecommunication field. In daily usage, it had been phased-out by IEEE since 2005 to be replaced by WPA/WPA2 (Wi-Fi Protected Access). WEP encryption algorithm can be easily cracked because of its widely documented weaknesses. Nevertheless, WEP is still has been used extensively as a research topic in the academic field. Certain enterprises still using WEP due to lack of security consciousness, economical constraint or because it is difficult to replace the legacy communication devices in which WEP is already bulged. In this paper, we give a review on WEP wireless security protocol in terms of its history, weaknesses, improvements, and current alternative approaches to overcome its weaknesses regarding the protocol in ICT (Information and Communication Technology) field. This research aims to address WEP protocol in its current versions and to give a spirit future direction research to enhance its security mechanism.

AB - WEP (Wired Equivalent Protocol) is a wireless security protocol ratified by IEEE (The Institute of Electrical and Electronics Engineers) in 1999. Since then, WEP is widely used in telecommunication field. In daily usage, it had been phased-out by IEEE since 2005 to be replaced by WPA/WPA2 (Wi-Fi Protected Access). WEP encryption algorithm can be easily cracked because of its widely documented weaknesses. Nevertheless, WEP is still has been used extensively as a research topic in the academic field. Certain enterprises still using WEP due to lack of security consciousness, economical constraint or because it is difficult to replace the legacy communication devices in which WEP is already bulged. In this paper, we give a review on WEP wireless security protocol in terms of its history, weaknesses, improvements, and current alternative approaches to overcome its weaknesses regarding the protocol in ICT (Information and Communication Technology) field. This research aims to address WEP protocol in its current versions and to give a spirit future direction research to enhance its security mechanism.

KW - Rivest cipher 4 (RC4)

KW - Wired equivalent protocol (WEP)

KW - Wireless security

UR - http://www.scopus.com/inward/record.url?scp=84873976601&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84873976601&partnerID=8YFLogxK

M3 - Article

VL - 40

SP - 39

EP - 43

JO - Journal of Theoretical and Applied Information Technology

JF - Journal of Theoretical and Applied Information Technology

SN - 1992-8645

IS - 1

ER -