Inam Ul Haq, Amna Nadeem, Saba Ramzan, Nazir Ahmad, Yasir Ahmad
: Due to inherent vulnerability, wireless networks require additional security, integrity, and authentication. The purpose of this study is to highlight the outdated ”Counter Mode Cipher Block Chaining Message Authentication Code Protocol” (CCMP) that has lately taken the place of the flawed ”Wired Equivalent Privacy” (WEP) protocol for authenticating IEEE 802.11 (WLANs). The IEEE 802.11s, a draught widespread for wireless networks in a mesh topology, also recommended using CCMP (WMNs). Due to CCMP’s two-pass operation, multi-hop wireless networks like WMN have a considerable latency problem. An increase in latency results in a decrease in service quality for multimedia applications as it is sensitive to delays. In addition to highlighting the CCMP’s vulnerability to pre-computation time-memory trade-o ff (TMTO) attacks, this paper recommends improving WLAN packet security by implementing a packet-by-packet security mechanism. Furthermore, we propose a fresh, dependable, low-latency foundation for WMN. Our security framework architecture employs a piggyback challenge-response mechanism to ensure data secrecy and data integrity. The use of a secret nonce, a new encryption key for each packet, and packet-level authentication are all features of the Piggyback challenge-response protocol. By authenticating every packet, unauthorized access can be swiftly prevented.
{"title":"Towards Robust and Low Latency Security Framework for\u0000IEEE 802.11 Wireless Networks","authors":"Inam Ul Haq, Amna Nadeem, Saba Ramzan, Nazir Ahmad, Yasir Ahmad","doi":"10.12785/ijcds/1501112","DOIUrl":"https://doi.org/10.12785/ijcds/1501112","url":null,"abstract":": Due to inherent vulnerability, wireless networks require additional security, integrity, and authentication. The purpose of this study is to highlight the outdated ”Counter Mode Cipher Block Chaining Message Authentication Code Protocol” (CCMP) that has lately taken the place of the flawed ”Wired Equivalent Privacy” (WEP) protocol for authenticating IEEE 802.11 (WLANs). The IEEE 802.11s, a draught widespread for wireless networks in a mesh topology, also recommended using CCMP (WMNs). Due to CCMP’s two-pass operation, multi-hop wireless networks like WMN have a considerable latency problem. An increase in latency results in a decrease in service quality for multimedia applications as it is sensitive to delays. In addition to highlighting the CCMP’s vulnerability to pre-computation time-memory trade-o ff (TMTO) attacks, this paper recommends improving WLAN packet security by implementing a packet-by-packet security mechanism. Furthermore, we propose a fresh, dependable, low-latency foundation for WMN. Our security framework architecture employs a piggyback challenge-response mechanism to ensure data secrecy and data integrity. The use of a secret nonce, a new encryption key for each packet, and packet-level authentication are all features of the Piggyback challenge-response protocol. By authenticating every packet, unauthorized access can be swiftly prevented.","PeriodicalId":37180,"journal":{"name":"International Journal of Computing and Digital Systems","volume":"39 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140735181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}