Securing Wireless LANs (WEP)
WEP is a data link-level security protocol which main objective is to have access control, data integrity and confidentiality of the network communication.
Summary
WEP is a data link-level security protocol which main objective is to have access control, data integrity and confidentiality of the network communication.
Things to Remember
Aim of WEP
- Access control
- Data Integrity
- Confidentiality
MCQs
No MCQs found.
Subjective Questions
No subjective questions found.
Videos
No videos found.

Securing Wireless LANs (WEP)
Securing Wireless LANs (WEP)
Wired Equivalent Protocol (WEP) is a data link level security protocol prescribed by 802.11 standards. It is first and widely used security choice offered in routers for users. It is secured as wired network but less in comparison to WPA2 (Wi-Fi Protected Access 2). It is recognized with 10 or 26 hexadecimal digits.
The 802.11 standard prescribes a data link level security protocol called WEP (Wired Equivalent Privacy), which is designed to make the security of a wireless LAN as good as that of a wired LAN. When 802.11 security is enabled, each station has a secret key shared with the base station. How the keys are distributed is not specified by the standard.
WEP Algorithm is Used to (WEP features):
- Protect wireless communication from eavesdropping (secretly listening to the private conversation of others without their consent)
- Prevent unauthorized access to wireless network
Goals of WEP:
- Access Control
- Data Integrity
- Confidentiality
- WEP relies on a secret key which is shared between the sender and the receiver.
- Sender: Mobile station (e.g.: laptop with wireless Ethernet)
- Receiver: Access Point (e.g.: base station)
- Secret Key is used to encrypt packets before they are transmitted. Integrity check is used to ensure packet are not modified in transit. WEP encryption uses a stream cipher based on the Ron's Code 4 (RC4) algorithm. RC4 was designed by Ronald Rivest and kept secret until it leaked out and was posted to the Internet in 1994. In WEP, RC4 generates a key stream that is XORed with the plaintext to form the cipher text.
- WEP Encryption
Encryption details:
- Uses RC4 algorithm for confidentiality and CRC-32 checksum for integrity.
- Standard 64-bit WEP uses a 40 bit key which is concatenated with a 24-bit initialization vector (IV) to form the RC4 key.
- The key size was limited before but now it is extended as 128-bit WEP using 104-bit key size.


Decryption Details:
At the receiver side, cipher text is X0Red with keystream to obtain the plain text.
- 64-bit WEP key is usually entered as a string 10 hexadecimal character.
- Each character represents four bits, 10 digits of four bits each gives 40 bits & adding 24 bits IV gives 64 bits WEP key.
- A 128-bit WEP key is usually entered as a string of 26 hexadecimal characters.
- 26 digits of four bits each give 104 bits and adding the 24-bit IV produces the complete key.
References:
- A.S. Tanenbaum, “Computer Networks”, 3rd Edition, Prentice Hall India, 1997.
- W. Stallings, “Data and Computer Communication”, Macmillan Press, 1989.
- Kurose Ross, “Computer Networking: A top-down approach”, 2nd Edition, Pearson Education
- Larry L. Peterson, Bruce S. Davie, “Computer Networks: A Systems Approach”, 3rd Edition, Morgan Kaufmann Publishers
Lesson
Network Security
Subject
Computer Engineering
Grade
Engineering
Recent Notes
No recent notes.
Related Notes
No related notes.