Review on different components of TKIP implemented wireless local area network

Salman Basiri, Zahra Ehtiatkar, Kasmiran Bin Jumari

    Research output: Contribution to journalArticle

    Abstract

    Temporal Key Integrity Protocol (TKIP) was designed to fix Wired Equivalent Privacy protocol (WEP) weaknesses and work with legacy devices. TKIP introduced different components such as TKIP Sequence Counter (TSC), key hierarchy, key exchange, temporal key derivation mechanism, per packet key mixing function, Michael message integrity. TKIP has been used for several years, but vulnerabilities and attacks have been discovered in this period and it is not reliable and secure any more. Although using AES/CCMP is the secure option for WLAN, there are still a lot of devices that can not support AES/CCMP operation mode. Fixing TKIP issues and bringing security to WEP and TKIP based wireless networks is an important topic that should not be neglected. In this paper, at first, review of the TKIP components and the research activities in this area are presented. Next, the weaknesses, issues and attacks are mentioned. Finally proposed solutions are briefly described. Good understanding of previous implemented protocols, their weaknesses and limitations are necessary for designing new security protocol.

    Original languageEnglish
    Pages (from-to)612-620
    Number of pages9
    JournalInternational Review on Computers and Software
    Volume7
    Issue number2
    Publication statusPublished - 2012

    Fingerprint

    Wireless local area networks (WLAN)
    Network protocols
    Wireless networks

    Keywords

    • Authentication
    • Cryptography
    • Key Exchange
    • Key Management
    • Michael Message Integrity Checking
    • TKIP
    • Wireless LAN Security

    ASJC Scopus subject areas

    • Computer Science(all)

    Cite this

    Review on different components of TKIP implemented wireless local area network. / Basiri, Salman; Ehtiatkar, Zahra; Jumari, Kasmiran Bin.

    In: International Review on Computers and Software, Vol. 7, No. 2, 2012, p. 612-620.

    Research output: Contribution to journalArticle

    Basiri, Salman ; Ehtiatkar, Zahra ; Jumari, Kasmiran Bin. / Review on different components of TKIP implemented wireless local area network. In: International Review on Computers and Software. 2012 ; Vol. 7, No. 2. pp. 612-620.
    @article{d76549767e934617a3e600115ae91e09,
    title = "Review on different components of TKIP implemented wireless local area network",
    abstract = "Temporal Key Integrity Protocol (TKIP) was designed to fix Wired Equivalent Privacy protocol (WEP) weaknesses and work with legacy devices. TKIP introduced different components such as TKIP Sequence Counter (TSC), key hierarchy, key exchange, temporal key derivation mechanism, per packet key mixing function, Michael message integrity. TKIP has been used for several years, but vulnerabilities and attacks have been discovered in this period and it is not reliable and secure any more. Although using AES/CCMP is the secure option for WLAN, there are still a lot of devices that can not support AES/CCMP operation mode. Fixing TKIP issues and bringing security to WEP and TKIP based wireless networks is an important topic that should not be neglected. In this paper, at first, review of the TKIP components and the research activities in this area are presented. Next, the weaknesses, issues and attacks are mentioned. Finally proposed solutions are briefly described. Good understanding of previous implemented protocols, their weaknesses and limitations are necessary for designing new security protocol.",
    keywords = "Authentication, Cryptography, Key Exchange, Key Management, Michael Message Integrity Checking, TKIP, Wireless LAN Security",
    author = "Salman Basiri and Zahra Ehtiatkar and Jumari, {Kasmiran Bin}",
    year = "2012",
    language = "English",
    volume = "7",
    pages = "612--620",
    journal = "International Review on Computers and Software",
    issn = "1828-6003",
    publisher = "Praise Worthy Prize",
    number = "2",

    }

    TY - JOUR

    T1 - Review on different components of TKIP implemented wireless local area network

    AU - Basiri, Salman

    AU - Ehtiatkar, Zahra

    AU - Jumari, Kasmiran Bin

    PY - 2012

    Y1 - 2012

    N2 - Temporal Key Integrity Protocol (TKIP) was designed to fix Wired Equivalent Privacy protocol (WEP) weaknesses and work with legacy devices. TKIP introduced different components such as TKIP Sequence Counter (TSC), key hierarchy, key exchange, temporal key derivation mechanism, per packet key mixing function, Michael message integrity. TKIP has been used for several years, but vulnerabilities and attacks have been discovered in this period and it is not reliable and secure any more. Although using AES/CCMP is the secure option for WLAN, there are still a lot of devices that can not support AES/CCMP operation mode. Fixing TKIP issues and bringing security to WEP and TKIP based wireless networks is an important topic that should not be neglected. In this paper, at first, review of the TKIP components and the research activities in this area are presented. Next, the weaknesses, issues and attacks are mentioned. Finally proposed solutions are briefly described. Good understanding of previous implemented protocols, their weaknesses and limitations are necessary for designing new security protocol.

    AB - Temporal Key Integrity Protocol (TKIP) was designed to fix Wired Equivalent Privacy protocol (WEP) weaknesses and work with legacy devices. TKIP introduced different components such as TKIP Sequence Counter (TSC), key hierarchy, key exchange, temporal key derivation mechanism, per packet key mixing function, Michael message integrity. TKIP has been used for several years, but vulnerabilities and attacks have been discovered in this period and it is not reliable and secure any more. Although using AES/CCMP is the secure option for WLAN, there are still a lot of devices that can not support AES/CCMP operation mode. Fixing TKIP issues and bringing security to WEP and TKIP based wireless networks is an important topic that should not be neglected. In this paper, at first, review of the TKIP components and the research activities in this area are presented. Next, the weaknesses, issues and attacks are mentioned. Finally proposed solutions are briefly described. Good understanding of previous implemented protocols, their weaknesses and limitations are necessary for designing new security protocol.

    KW - Authentication

    KW - Cryptography

    KW - Key Exchange

    KW - Key Management

    KW - Michael Message Integrity Checking

    KW - TKIP

    KW - Wireless LAN Security

    UR - http://www.scopus.com/inward/record.url?scp=84864370036&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=84864370036&partnerID=8YFLogxK

    M3 - Article

    AN - SCOPUS:84864370036

    VL - 7

    SP - 612

    EP - 620

    JO - International Review on Computers and Software

    JF - International Review on Computers and Software

    SN - 1828-6003

    IS - 2

    ER -