It is my second draft. I have added more content about my topic. I think there is some questions I want to make sure. 1. Could you understand the what is the WEP 2. Could you understand the weakness of WEP 3. Could you figure out the IV's weakness 4. How do u think the basic conception of the wireless network security.
Audience: The 8th Information Security Conference (ISC'05). The audience have strong background in network security.
Objective: The paper analyzed the weakness of WEP, and introduced some cracking way and the process of cracking it. At last, it give some recommendation on this issue.