A Survey of Wireless Security (original) (raw)
Related papers
Holistic approach to Wep protocol in securing wireless network infrastructure
Computer Science and Information Systems, 2006
Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks that can jeopardize security goals of WEP protocol: authentication confidentiality and integrity. The paper, also, gives a summary of security improvements of WEP protocol that can lead to the higher level of wireless network infrastructure protection. Comparative analysis shows the advantages of the new 802.11i standard in comparison to the previous security solutions. A proposal of possible security improvements of RSNA (Robust Security Network Association) is presented.
IEEE 802.11 WEP (Wired Equivalent Privacy) Concepts and Vulnerability
The wireless networking is becoming very popular among large number of internet users. Because of the popularity of the wireless networking technology, large number of wireless networking products and protocols are available for the home and business use. Prior to the introduction of 802.11 standard by IEEE, many other technologies were developed that used various forms of spectrum hopping to facilitate wireless data transfer. Wireless transmissions are available to authorized users and also to the unauthorized users(hackers). The IEEE802.11 standard offers some level of protection. This protection, known as the Wired Equivalent Privacy (WEP) protocol, defines a set of instructions and rules by which wireless data can be transmitted over the airwaves with some amount of security. One of the objectives of WEP is to provide data privacy equivalent to the level of wired network. However, WEP protocol has many weaknesses. This paper discusses about concepts and weaknesses of WEP protocol. This paper also lists some of the available solutions for the WEP vulnerability.
A survey on wireless security protocols (WEP, WPA and WPA2/802.11i)
Computer Science and …, 2009
Wireless technology has been gaining rapid popularity for some years. Adaptation of a standard depends on the ease of use and level of security it provides. In this case, contrast between wireless usage and security standards show that the security is not keeping up with the growth paste of end user's usage. Current wireless technologies in use allow hackers to monitor and even change the integrity of transmitted data. Lack of rigid security standards has caused companies to invest millions on securing their wireless networks. There are three major types of security standards in wireless. In our previous papers which registered in ICFCC 2009 Malaysia and ICCDA 2009 Singapore [1] [2], we explained the structure of WEP and WPA as first and second wireless security protocols and discussed all their versions, problems and improvements. Now, we try to explain WPA2 versions, problems and enhancements that have done solve the WPA major weakness. Finally we make a comparison among WEP and WPA and WPA2 as all wireless security protocols in Wi-Fi technology. In the next phase we hope that we will publish a complete comparison among wireless security techniques by add the WiMax security technique and make a whole comparison among all security protocols in this area.
Review of Wireless Security Protocols WEP WPA WPA220200419 114912 1v3j4tv
Lahore Lead university, 2020
Wireless technology has been increasingly popular for some year. Acceptance of wireless network depend on the case of use and level of security. Now day the most of wireless network hold over sensitive information and given access only authorized user. As a result communication network are essential implements some type of security protocol that will restrict users to who have access to network resource. To make sure the network is most secure. Must be network capable implements two concepts data privacy and data integrity. Data privacy is ensuring this when it comes to data integrity all the pocket on network are irreversible or unreadable for any universal force to sure that edited data is corrected. There are three main type of security standard in wireless. In this survey paper we discusses three most well know wireless network protocols also name WEP, WPA and WPA2. We discussed the shape of WEP and WPA, WPA2. Now we try to explain WPA2 version and problem after this to solve the major problem. At the end we make comparison among WEP and WPA and WPA2 as all wireless security protocols in Wi-Fi technology.
Review on Wireless Security Protocols (WEP, WPA, WPA2 & WPA3)
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2019
Wireless networks have posed a threat in Data Security that has stuck to the core of data communication between two points. Absence of inflexible security measures has made numerous organizations contribute millions to verify their systems. Development of different security conventions for Wireless LANs has been given in this paper. Also, vulnerabilities of WEP/WPA/WPA2/WPA3 have been discussed and how the wireless networks are attacked using the design flaws present in these Wireless Security Protocols. The use of different tools and programming languages used for testing the strength of the protocols. Tools like nmap, zenmap, aircrack-ng, etc., are used in the Linux environment to practically demonstrate the attacks against these networks using WEP/WPA/WPA2/WPA3 protocols. The solutions for the shortcomings in WEP has been applied in WPA, similarly WPA2 and WPA3.
Securing Wireless Networks with Enhanced WEP
2006
Wireless is the next generation networking technology. The security of such technology is very critical because its physical layer is the electro-magnetic waves that can be easily intercepted by anyone. The original security protocol for 802.11 wireless networks is called WEP (Wired Equivalent Privacy), it is a protocol that is based on symmetric-key encryption algorithm RC4 (Rivest Cipher 4). Unfortunately this protocol had many flaws that made it exposed to many attacks. This paper presents a set of improvements for WEP: these improvements convert WEP to a hybrid cryptosystem, a system that is based on both a symmetric-key algorithm and an asymmetric-key algorithm.
A comparison between wireless LAN security protocols
The paper presents an analysis of the WEP, WPA and IEEE 802.11i protocols, from the WLANs security requirements point of view. Then, they are compared by two criteria: the network security level that each one assures and their influence on the network performance.
Common Security Protocols for Wireless Networks: A Comparative Analysis
International Journal of Psychosocial Rehabilitation
In computer networks, security is one of the most important aspects of protecting the network from various attacks. Especially in wireless networks, security can prevent unauthorized data access and save systems from potential threats. The security protocols in the wireless networks help to achieve the security process. Many protocols are designed to accomplish wireless security, which includes Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA) and WiFi Protected Access 2 (WPA2). This research paper discusses on the prominent wireless security protocols, that is, Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA) and WiFi Protected Access (WPA2) by providing a comparative analysis in terms of strengths and weaknesses of each protocol. In addition to that, the paper assesses each protocol in terms of authentication and encryption mechanisms and recommends the best wireless security protocol for a corporate network, which helps the network from unauthorized attacks.