Modified temporal key integrity protocol for efficient wireless network security

被引:0
|
作者
Doomun, M. Razvi [1 ]
Soyjaudah, K. M. Sunjiv [1 ]
机构
[1] Univ Mauritius, Fac Engn, Reduit, Mauritius
关键词
TKIP; wireless security; key mixing; security overhead;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Temporal Key Integrity Protocol (TKIP) is the IEEE TaskGroupi's solution for the security loop holes present in the already widely deployed 802.11 hardware. It is a set of algorithms that wrap WEP to give the best possible solution given design constraints such as paucity of the CPU cycles, hardwiring of the WEP encryption algorithm and software upgrade dependent. Thus, TKIP is significantly more difficult and challenging to implement and optimise than WEP. The objective of this research is to examine the cost/benefit of TKIP security mechanisms and optimise its implementation to reduce security overhead for better performance. We propose a modified TKIP (MoTKIP) with improved packet encapsulation and decapsulation procedure that reduces computation and packet overhead in classic TKIP substantially and optimises total wireless network throughput rates.
引用
收藏
页码:151 / 156
页数:6
相关论文
共 50 条
  • [1] Enhanced Security Algorithm with Key Exchange Protocol in Wireless Network
    Princy, Infanta S.
    Revathi, G.
    [J]. PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,
  • [2] An Efficient Pairwise and Group Key Management Protocol for Wireless Sensor Network
    Musfiq Rahman
    Srinivas Sampalli
    [J]. Wireless Personal Communications, 2015, 84 : 2035 - 2053
  • [3] An Efficient Pairwise and Group Key Management Protocol for Wireless Sensor Network
    Rahman, Musfiq
    Sampalli, Srinivas
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (03) : 2035 - 2053
  • [4] Secure and efficient key management protocol for wireless sensor network and simulation
    Institute of Command Automation PLA, University of Science and Technology, Nanjing 210007, China
    不详
    [J]. Xitong Fangzhen Xuebao, 2008, 7 (1898-1903):
  • [5] An Efficient Authenticated Key Exchange Protocol for Wireless Body Area Network
    Yan, Rui
    Liu, Jingwei
    Sun, Rong
    [J]. PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2015, 322 : 51 - 58
  • [6] Cocyclic Jacket Matrix with Public Key Security Protocol for Wireless Rural Network
    Hou, Jia
    Lee, Moon Ho
    [J]. 2009 FIRST INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, 2009, : 195 - +
  • [7] On the security of wireless network protocol 802.11
    Sun, Hong
    Yang, Yi-Xian
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2003, 31 (07): : 1098 - 1100
  • [8] Design and implementation of security efficient reliable routing protocol for wireless sensor network
    Guo, Weixia
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MECHATRONICS, ELECTRONIC, INDUSTRIAL AND CONTROL ENGINEERING, 2015, 8 : 894 - 898
  • [9] Key Technologies of Wireless Heterogeneous Network Security
    Wu Meng
    [J]. ZTE Communications, 2008, (03) : 34 - 39
  • [10] An efficient elliptic curve cryptography based authenticated key agreement protocol for wireless LAN security
    Azim, MA
    Jamalipour, A
    [J]. 2005 WORKSHOP ON HIGH PERFORMANCE SWITCHING AND ROUTING, 2005, : 376 - 380