B Key Mapping Key: In this type of system the access point will send the new-
shared secret key only to the concerned individual node. Having more shared secret
keys would help the system stay with the shared keys for longer as it takes more time
to exhaust the IVs. The access point can generate the keys for individual nodes using
the MAC addresses of the client cards.
4.2 IV Avoidance Algorithm
The WEP protocol suffered from several limitations like the IV reuse and weak RC4
keystream reuse attack as discussed in previous section. We tried to eliminate the IV
reuse problem by updating the shared key as an enhancement to the existing WEP
protocol. But there is always a chance of an IV reuse due to Birthday Paradox. Thus,
the IV collision still remains a critical issue and cannot be ignored.
In the following section we propose an IV Collision Avoidance Algorithm that
further strengthens our proposed new protocol and makes it foolproof.
1. The key idea in avoiding IV collision is to assign a unique pattern of bits to
every wireless node in the system. The AP partitions the IV by choosing
specific bits out of the 24 bits in the IV. AP chooses specific bits in order to
avoid a predictable pattern. For e.g. consider an IV of 6 bits. The AP
partitions the IV using a specific bit pattern say (1 and 3). The remaining
bits (2, 4, 5 and 6) form the other partition and can assume all possible 2
4
=
16 values. The (1 and 3) pattern is unique to all the nodes. Howsoever, the
values corresponding to these bit numbers vary in all possible 2
2
= 4 nodes.
These variations ensure that even if other partition bits assume the same
values the possibility of collision is completely eliminated.
2. The above mentioned pattern will remain intact for a session and will be
unique to each node to avoid IV reuse.
3. The AP communicates to each individual node by sending bits equal to
(length of IV+ length of the partition number of bits). For e.g. in our case
(24+N) bits following the data payload in the WEP frame structure where N
is length of partition number of bits. The bits enabled in the first 24 bits will
denote that they are partition bits and the remaining N bits will denote the
values for that corresponding partition. For e.g. In an IV of 6 bits if the
partition is (1, 3) and the corresponding value at these bit positions is (0 and
1) the AP will send a frame of (6+2) = 8 bit (101000, 01).
4. This pattern is transferred only once when the wireless node joins the access
point. The pattern holds no good after the wireless node is disconnected from
the network. Upon re-association a new pattern is provided by the access
point.
The AP by ensuring that no bits at its pre determined pattern are repeated
guarantees a complete security.
For example, if the IV length is of 4 bits and we partition it by using 2 bits. Upon
joining a network the access point sends the wireless node a pattern of following
sequence numbers (0101, 01). This pattern is randomly chosen by the access point
and is unique to every node. This would mean that that out of the 4 bits in the IV, bit
numbers 2 and 4 are the partition bits since they are enabled and their values are 0 and
27