International Journal of Computer Network and Information Security(IJCNIS)
ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)
Published By: MECS Press
IJCNIS Vol.5, No.11, Sep. 2013
Triple Layered Encryption Algorithm for IEEE 802.11 WLANs in E-Government Services
Full Text (PDF, 76KB), PP.36-41
Wireless local area network (WLAN) can provide e-government services at all levels, from local to national as the WLAN enabled devices have the flexibility to move from one place to another within offices while maintaining connectivity with the network. However, government organizations are subject to strict security policies and other compliance requirements. Therefore, WLAN must ensure the safeguard the privacy of individual data with the strictest levels of security. The 802.11 MAC specifications describe an encryption protocol called Wired Equivalent Privacy (WEP) which is used to protect wireless communications from eavesdropping. It is also capable of preventing unauthorized access. However, the WEP protocol often fails to accomplish its security goal due to the weakness in RC4 and the way it is applied in WEP protocol. This paper focuses the improvement of existing WEP protocol using the varying secret key for each transmission. This will remove the insecurities that currently make the RC4 unattractive for secured networking and this will add further cryptographic strength if applied to Rijndael algorithm. Our result shows that the proposed algorithm is more suitable for small and medium packets and AES for large packets.
Cite This Paper
M A Kabir,K A Sayeed, M A Matin, T Mehenaz, M Kamruzzaman,"Triple Layered Encryption Algorithm for IEEE 802.11 WLANs in E-Government Services",IJCNIS, vol.5, no.11, pp.36-41,2013. DOI: 10.5815/ijcnis.2013.11.05
 Borisov, N., Goldberg, I. and Wagner, D. (2001) ‘Intercepting mobile communications: the insecurity of 802.11’, TheSeventh Annual International Conference on Mobile Computing and Networking, (MOBICOM), 2001.
 L. M. S. C. of the IEEE Computer Society. ‘Wireless LAN medium access control (MAC) and physical layer (PHY) specifications.’ IEEE Standard 802.11, 1999 Edition, 1999.
 Rivest, R.L. ‘The RC4 Encryption Algorithm’, RSA Data Security, Inc., March, 1992.
 Xiao, Y. Bandela, C. Du, X. Dass, E ‘Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANS’ Int. J. Wireless an Mobile Computing. Vol. 1. Nos. ¾. 2006.
 P. Prasithsangaree, P. Krishnamurthy, ‘Analysis of Energy Consumption of RC4 and AES Algorithms in Wireless LANs’. Globecom, IEEE Conference Paper, August 2003.
 Joan Daemen and Vincent Rijmen, AES submission document on Rijndael, Version 2, September 1999.
 M.N. Islam, M. Mia, M. Chowdhury, M.A.Matin, ‘Effect of Security Increment to Symmetric Data Encryption through AES Methodology’ Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2008( SNPD '08). 6-8 Aug. 2008, PP.291 – 294, Phuket, Thailand.
 M A Matin, M M Hossain, M F Islam, M N Islam and M M Hossain “Performance evaluation of symmetric encryption algorithm in MANET and WLAN” 2009 international conference for TECHPOS, 14-15 Dec. 2009, pp. 1-4, Kuala Lumpur, Malaysia.