Intercepting mobile communications: the insecurity of 802.11
N. Borisov, I. Goldberg, and D. Wagner. MobiCom '01: Proceedings of the 7th annual international conference on Mobile computing and networking, page 180--189. New York, NY, USA, ACM, (2001)
Abstract
The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, used to protect link-layer communications from eavesdropping and other attacks. We have discovered several serious security flaws in the protocol, stemming from mis-application of cryptographic primitives. The flaws lead to a number of practical attacks that demonstrate that WEP fails to achieve its security goals. In this paper, we discuss in detail each of the flaws, the underlying security principle violations, and the ensuing attacks.
%0 Conference Paper
%1 BG01
%A Borisov, Nikita
%A Goldberg, Ian
%A Wagner, David
%B MobiCom '01: Proceedings of the 7th annual international conference on Mobile computing and networking
%C New York, NY, USA
%D 2001
%I ACM
%K security wlan www02 wwwbook wwwkap04
%P 180--189
%T Intercepting mobile communications: the insecurity of 802.11
%X The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, used to protect link-layer communications from eavesdropping and other attacks. We have discovered several serious security flaws in the protocol, stemming from mis-application of cryptographic primitives. The flaws lead to a number of practical attacks that demonstrate that WEP fails to achieve its security goals. In this paper, we discuss in detail each of the flaws, the underlying security principle violations, and the ensuing attacks.
@inproceedings{BG01,
abstract = {The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, used to protect link-layer communications from eavesdropping and other attacks. We have discovered several serious security flaws in the protocol, stemming from mis-application of cryptographic primitives. The flaws lead to a number of practical attacks that demonstrate that WEP fails to achieve its security goals. In this paper, we discuss in detail each of the flaws, the underlying security principle violations, and the ensuing attacks.},
added-at = {2010-07-13T16:25:11.000+0200},
address = {New York, NY, USA},
author = {Borisov, Nikita and Goldberg, Ian and Wagner, David},
biburl = {https://www.bibsonomy.org/bibtex/2744fb9d407f87d6648f7308d9112b5d8/lysander07},
booktitle = {MobiCom '01: Proceedings of the 7th annual international conference on Mobile computing and networking},
description = {Intercepting mobile communications},
interhash = {94b95fcec4926b396f44de576660fe25},
intrahash = {744fb9d407f87d6648f7308d9112b5d8},
keywords = {security wlan www02 wwwbook wwwkap04},
pages = {180--189},
publisher = {ACM},
timestamp = {2010-07-13T16:25:11.000+0200},
title = {{Intercepting mobile communications: the insecurity of 802.11}},
year = 2001
}