Two Tier Security Enhancement for Wireless Protocol WEP (Wired Equivalent Privacy)
D. J. Evanjaline1, P. Rajakumar2, N. Kalpana3
1Dr. D.J .Evanjaline Department of Computer Applications, Jayaram College of Engg  & Technology,  Anna University, Trichy, India.
2Mr. P .Rajakumar Department of Computer Applications, Jayaram
College of  Engg  & Technology, Anna University, Trichy, India.
3Ms. N. Kalpana Department of Computer Applications, Jayaram College of  Engg & Technology, Anna University, Trichy, India.
Manuscript received on February 17, 2015. | Revised Manuscript received on February 26, 2015. | Manuscript published on March 05, 2015. | PP: 60-63 | Volume-5 Issue-1, March 2015. | Retrieval Number: A2526035115/2015©BEIESP
Open Access | Ethics and Policies | Cite
©The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: A Wireless Local Area Network (WLAN) is a flexible data communication system implemented as an extension to or as an alternative for a wired Local Area Network (LAN). However, anyone can eavesdrop on information so that WLAN has the hidden security trouble such as leaking of electromagnetic wave or eavesdropping of data because WLAN adopts common electromagnetic wave as media to transmit data. Therefore, the security of WLAN is very important and outstanding. In IEEE 802.11, there are three security technologies used to ensure the data security in WLAN—SSID (Service Set Identifier), MAC (Media Access Control), WEP (Wired Equivalent Privacy). The proposed work falls on the third technology namely the WEP protocol. WEP suffered threats of attacks from hackers owing to certain security shortcomings in the WEP protocol. The proposed schemes implemented in two different layers of WLAN network architecture to strengthen the security of WLAN against the key stream reuse attacks and weak IV attacks.
Keywords: WLAN, WEP, Initialization Vector.