A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.
-
Upload
alicia-peters -
Category
Documents
-
view
216 -
download
0
Transcript of A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.
![Page 1: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/1.jpg)
A Methodology for A Methodology for Evaluating Wireless Evaluating Wireless Network Security Network Security
Protocols Protocols
David RagerDavid Rager
Kandaraj PiamratKandaraj Piamrat
![Page 2: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/2.jpg)
OutlineOutline
► IntroductionIntroduction►Explanation of TermsExplanation of Terms►Evaluation MethodologyEvaluation Methodology►Analysis of WEP, WPA, and RSNAnalysis of WEP, WPA, and RSN►Graphical ResultsGraphical Results►Conclusion Conclusion
![Page 3: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/3.jpg)
IntroductionIntroduction
►Difference properties of wireless Difference properties of wireless network comparing to wired networknetwork comparing to wired network
►Two lines of defense in wireless Two lines of defense in wireless network securitynetwork security Preventive approachPreventive approach Intrusion Detection and Response Intrusion Detection and Response
approachapproach
►WEP WPA RSNWEP WPA RSN
![Page 4: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/4.jpg)
Explanation of TermsExplanation of Terms
►WEP – Wired Equivalent Protocol WEP – Wired Equivalent Protocol
(attempt #1)(attempt #1)►WPA – Wi-Fi Protected Access (attempt #2)WPA – Wi-Fi Protected Access (attempt #2)►RSN – Robust Secure Network (attempt #3)RSN – Robust Secure Network (attempt #3)►EAP – Extensible Authentication Protocol►TKIP – Temporal Key Integrity Protocol ►AES – Advanced Encryption Standard
![Page 5: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/5.jpg)
Explanation of Terms (cont.)Explanation of Terms (cont.)
►CCMP – Counter mode with Cipher block Chaining Message authentication code Protocol
►ICV – Integrity Check Value►MIC – Message Integrity Check ►RADIUS – Remote Authentication Dial
in User Service►IV – Initialization Vector
![Page 6: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/6.jpg)
Evaluation MethodologyEvaluation Methodology
►Authentication CapabilityAuthentication Capability►Encryption StrengthEncryption Strength► Integrity GuaranteesIntegrity Guarantees►Prevention of AttacksPrevention of Attacks► Identity ProtectionIdentity Protection►Ease and Cost of ImplementationEase and Cost of Implementation►Power ConsumptionPower Consumption►Novel IdeasNovel Ideas
![Page 7: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/7.jpg)
Authentication capabilityAuthentication capability
Consideration 0(bad) 1(fair) 2(good)
Type of authentication
Key with challenge response
Key with challenge
response and MAC address
Credentials based
Number of authentication
servers
One Three (# faults permitted) * 3
+ 1
Use of new authentication mechanisms
None - Use of EAP (802.11X)[tech-faq]
Known MITM attacks
One or more - None
![Page 8: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/8.jpg)
Encryption StrengthEncryption Strength
Consideration 0(bad) 1(fair) 2(good)
Key type Static key - Dynamic key
Cipher key type RC4 - AES
Cipher key length 40 or 104 bit encryption
128 bit encryption 128 bit encryption + 64 bit
authentication
Key lifetime 24-bit IV - 48-bit IV
Time used to crack Few hours Few days Centuries
Encrypted packet needed to crack
Few millions - Few trillions
Can be recovered by cryptanalysis
Yes - No
Key management used
None Static EAP
![Page 9: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/9.jpg)
Integrity GuaranteesIntegrity Guarantees
Consideration 0(bad) 1(fair) 2(good)
Integrity of message header
None Michael CCM
Integrity of the data
CRC-32 Michael CCM
![Page 10: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/10.jpg)
Prevention of AttacksPrevention of Attacks
Consideration 0(bad) 1(fair) 2(good)
Replay attack prevention
None - IV sequence , Per-packet key
mixing
DoS cookie No - Yes
Number of known attacks prevented
None Some of them All of them
Minimizes damage No - Yes
![Page 11: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/11.jpg)
Identity ProtectionIdentity Protection
Consideration 0(bad) 1(fair) 2(good)
Group identity revealed to
Entire network All parties Specific parties
Specific identity revealed to
Entire network All parties Specific parties
![Page 12: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/12.jpg)
Ease and Cost of Ease and Cost of ImplementationImplementation
Consideration 0(bad) 1(fair) 2(good)
Computation cost High Medium Low
Incremental installation No - Yes
Number of messages exchanged
300 30 3
Number of actors involved
Many actors - Few actors
Packet key Mixing function Concatenated No need
Additional server hardware
Yes - No
Additional network infrastructure
Yes - No
Number of gates in client device
High - Low
Lines of Code High - Low
![Page 13: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/13.jpg)
Power ConsumptionPower Consumption
Consideration 0(bad) 1(fair) 2(good)
Clients use low power
No - Yes
Client can detect attacks and enter low-
power mode
No - Yes
![Page 14: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/14.jpg)
Novel IdeasNovel Ideas
Consideration 0(bad) 1(fair) 2(good)
Determines physical location
No - Yes
![Page 15: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/15.jpg)
Analysis of WEPAnalysis of WEP
![Page 16: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/16.jpg)
Authentication capabilityAuthentication capability
Consideration 0(bad) 1(fair) 2(good)
Type of authentication
Key with challenge response
Key with challenge
response and MAC address
Credentials based
Number of authentication
servers
One Three (# faults permitted) * 3 + 1
Use of new authentication mechanisms
None - Use of EAP (802.11X)[tech-
faq]
Known MITM attacks
One or more - None
![Page 17: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/17.jpg)
Encryption StrengthEncryption Strength
Consideration 0(bad) 1(fair) 2(good)
Key type Static key - Dynamic key
Cipher key type RC4 - AES
Cipher key length 40 or 104 bit encryption
128 bit encryption 128 bit encryption + 64 bit authentication
Key lifetime 24-bit IV - 48-bit IV
Time used to crack Few hours Few days Centuries
Encrypted packet needed to crack
Few millions - Few trillions
Can be recovered by cryptanalysis
Yes - No
Key management used
None Static EAP
![Page 18: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/18.jpg)
Integrity GuaranteesIntegrity Guarantees
Consideration 0(bad) 1(fair) 2(good)
Integrity of message header
None Michael CCM
Integrity of the data
CRC-32 Michael CCM
![Page 19: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/19.jpg)
Prevention of AttacksPrevention of Attacks
Consideration 0(bad) 1(fair) 2(good)
Replay attack prevention
None - IV sequence , Per-packet key mixing
DoS cookie No - Yes
Number of known attacks prevented
None Some of them All of them
![Page 20: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/20.jpg)
Identity ProtectionIdentity Protection
Consideration 0(bad) 1(fair) 2(good)
Group identity revealed to
Entire network All parties Specific parties
Specific identity revealed to
Entire network All parties Specific parties
![Page 21: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/21.jpg)
Ease and Cost of Ease and Cost of ImplementationImplementation
Consideration 0(bad) 1(fair) 2(good)
Computation cost High Medium Low
Incremental installation No - Yes
Number of messages exchanged
300 30 3
Number of actors involved
Many actors - Few actors
Packet key Mixing function Concatenated No need
Additional server hardware
Yes - No
Additional network infrastructure
Yes - No
Number of gates in client device
High - Low
Lines of Code High - Low
![Page 22: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/22.jpg)
Power ConsumptionPower Consumption
Consideration 0(bad) 1(fair) 2(good)
Clients use low power
No - Yes
Client can detect attacks and enter low-power mode
No - Yes
![Page 23: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/23.jpg)
Novel IdeasNovel Ideas
Consideration 0(bad) 1(fair) 2(good)
Determines physical location
No - Yes
![Page 24: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/24.jpg)
Scores of WEPScores of WEP
► Authentication Capability (0/8)Authentication Capability (0/8)► Encryption Strength (0/16)Encryption Strength (0/16)► Integrity Guarantees (0/4)Integrity Guarantees (0/4)► Prevention of Attacks (0/6)Prevention of Attacks (0/6)► Identity Protection (4/4)Identity Protection (4/4)► Ease and Cost of Implementation (17/18)Ease and Cost of Implementation (17/18)► Power Consumption (2/4)Power Consumption (2/4)► Novel Ideas (0/2)Novel Ideas (0/2)
Total Score = 2.44/8 = Total Score = 2.44/8 = 30.56 30.56 %%
![Page 25: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/25.jpg)
Analysis of WPAAnalysis of WPA
![Page 26: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/26.jpg)
Authentication capabilityAuthentication capability
Consideration 0(bad) 1(fair) 2(good)
Type of authentication
Key with challenge response
Key with challenge
response and MAC address
Credentials based
Number of authentication
servers
One Three (# faults permitted) * 3 + 1
Use of new authentication mechanisms
None - Use of EAP (802.11X)[tech-
faq]
Known MITM attacks
One or more - None
![Page 27: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/27.jpg)
Encryption StrengthEncryption Strength
Consideration 0(bad) 1(fair) 2(good)
Key type Static key - Dynamic key
Cipher key type RC4 - AES
Cipher key length 40 or 104 bit encryption
128 bit encryption 128 bit encryption + 64 bit authentication
Key lifetime 24-bit IV - 48-bit IV
Time used to crack Few hours Few days Centuries
Encrypted packet needed to crack
Few millions - Few trillions
Can be recovered by cryptanalysis
Yes - No
Key management used
None Static EAP
![Page 28: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/28.jpg)
Integrity GuaranteesIntegrity Guarantees
Consideration 0(bad) 1(fair) 2(good)
Integrity of message header
None Michael CCM
Integrity of the data
CRC-32 Michael CCM
![Page 29: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/29.jpg)
Prevention of AttacksPrevention of Attacks
Consideration 0(bad) 1(fair) 2(good)
Replay attack prevention
None - IV sequence , Per-packet key mixing
DoS cookie No - Yes
Number of known attacks prevented
None Some of them All of them
![Page 30: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/30.jpg)
Identity ProtectionIdentity Protection
Consideration 0(bad) 1(fair) 2(good)
Group identity revealed to
Entire network All parties Specific parties
Specific identity revealed to
Entire network All parties Specific parties
![Page 31: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/31.jpg)
Ease and Cost of Ease and Cost of ImplementationImplementation
Consideration 0(bad) 1(fair) 2(good)
Computation cost High Medium Low
Incremental installation No - Yes
Number of messages exchanged
300 30 3
Number of actors involved
Many actors - Few actors
Packet key Mixing function Concatenated No need
Additional server hardware
Yes - No
Additional network infrastructure
Yes - No
Number of gates in client device
High - Low
Lines of Code High - Low
![Page 32: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/32.jpg)
Power ConsumptionPower Consumption
Consideration 0(bad) 1(fair) 2(good)
Clients use low power
No - Yes
Client can detect attacks and enter low-power mode
No - Yes
![Page 33: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/33.jpg)
Novel IdeasNovel Ideas
Consideration 0(bad) 1(fair) 2(good)
Determines physical location
No - Yes
![Page 34: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/34.jpg)
Scores of WPAScores of WPA
► Authentication Capability (6/8)Authentication Capability (6/8)► Encryption Strength (14/16)Encryption Strength (14/16)► Integrity Guarantees (2/4)Integrity Guarantees (2/4)► Prevention of Attacks (4/6)Prevention of Attacks (4/6)► Identity Protection (0/4)Identity Protection (0/4)► Ease and Cost of Implementation (5/18)Ease and Cost of Implementation (5/18)► Power Consumption (1/4)Power Consumption (1/4)► Novel Ideas (0/2)Novel Ideas (0/2)
Total Score = 3.32/8 = Total Score = 3.32/8 = 41.4941.49 % %
![Page 35: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/35.jpg)
Analysis of RSNAnalysis of RSN
![Page 36: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/36.jpg)
Authentication capabilityAuthentication capability
Consideration 0(bad) 1(fair) 2(good)
Type of authentication
Key with challenge response
Key with challenge response and MAC address
Credentials based
Number of authentication
servers
One Three (# faults permitted) * 3 + 1
Use of new authentication mechanisms
None - Use of EAP (802.11X)[tech-
faq]
Known MITM attacks
One or more - None
![Page 37: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/37.jpg)
Encryption StrengthEncryption Strength
Consideration 0(bad) 1(fair) 2(good)
Key type Static key - Dynamic key
Cipher key type RC4 - AES
Cipher key length 40 or 104 bit encryption
128 bit encryption 128 bit encryption + 64 bit authentication
Key lifetime 24-bit IV - 48-bit IV
Time used to crack Few hours Few days Centuries
Encrypted packet needed to crack
Few millions - Few trillions
Can be recovered by cryptanalysis
Yes - No
Key management used
None Static EAP
![Page 38: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/38.jpg)
Integrity GuaranteesIntegrity Guarantees
Consideration 0(bad) 1(fair) 2(good)
Integrity of message header
None Michael CCM
Integrity of the data
CRC-32 Michael CCM
![Page 39: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/39.jpg)
Prevention of AttacksPrevention of Attacks
Consideration 0(bad) 1(fair) 2(good)
Replay attack prevention
None - IV sequence , Per-packet key mixing
DoS cookie No - Yes
Number of known attacks prevented
None Some of them All of them
![Page 40: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/40.jpg)
Identity ProtectionIdentity Protection
Consideration 0(bad) 1(fair) 2(good)
Group identity revealed to
Entire network All parties Specific parties
Specific identity revealed to
Entire network All parties Specific parties
![Page 41: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/41.jpg)
Ease and Cost of Ease and Cost of ImplementationImplementation
Consideration 0(bad) 1(fair) 2(good)
Computation cost High Medium Low
Incremental installation No - Yes
Number of messages exchanged
300 30 3
Number of actors involved
Many actors - Few actors
Packet key Mixing function Concatenated No need
Additional server hardware
Yes - No
Additional network infrastructure
Yes - No
Number of gates in client device
High - Low
Lines of Code High - Low
![Page 42: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/42.jpg)
Power ConsumptionPower Consumption
Consideration 0(bad) 1(fair) 2(good)
Clients use low power
No - Yes
Client can detect attacks and enter low-power mode
No - Yes
![Page 43: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/43.jpg)
Novel IdeasNovel Ideas
Consideration 0(bad) 1(fair) 2(good)
Determines physical location
No - Yes
![Page 44: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/44.jpg)
Scores of RSNScores of RSN
► Authentication Capability (6/8)Authentication Capability (6/8)► Encryption Strength (15/16)Encryption Strength (15/16)► Integrity Guarantees (4/4)Integrity Guarantees (4/4)► Prevention of Attacks (4/6)Prevention of Attacks (4/6)► Identity Protection (0/4)Identity Protection (0/4)► Ease and Cost of Implementation (4/18)Ease and Cost of Implementation (4/18)► Power Consumption (2/4)Power Consumption (2/4)► Novel Ideas (0/2)Novel Ideas (0/2)
Total Score = 4.08/8 = Total Score = 4.08/8 = 50.9550.95 % %
![Page 45: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/45.jpg)
Graphical ResultsGraphical Results
![Page 46: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/46.jpg)
Comparison of categorical Comparison of categorical performanceperformance
Comparison of Categorical Performance
0% 20% 40% 60% 80% 100%
Authentication Capability
Encryption Strength
Integrity Guarantees
Prevention of Attacks
Identity Protection
Ease and Cost of Implementation
Power Consumption
Novel Ideas
Pe
rfo
rma
nc
e C
ate
go
ry
% of Points
WEP
WPA
RSN
![Page 47: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/47.jpg)
Main contributors to each Main contributors to each protocol’s successprotocol’s success
Main Contributors to Each Protocol's Success
WEP WPA RSN
Protocol
% o
f P
oin
ts
Novel Ideas
Power Consumption
Ease and Cost ofImplementation
Identity Protection
Prevention of Attacks
Integrity Guarantees
Encryption Strength
Authentication Capability
![Page 48: A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.](https://reader030.fdocuments.in/reader030/viewer/2022032705/56649dd05503460f94ac5298/html5/thumbnails/48.jpg)
ConclusionConclusion
►We have defined specific metrics for We have defined specific metrics for protocol evaluation.protocol evaluation.
►We evaluate different wireless security We evaluate different wireless security protocol based on these metrics.protocol based on these metrics.
►Questions ?Questions ?