Comparative Analysis: Wi-Fi Security Protocols (original) (raw)

IJERT-Comparative Analysis: Wi-Fi Security Protocols

International Journal of Engineering Research and Technology (IJERT), 2013

https://www.ijert.org/comparative-analysis-wi-fi-security-protocols https://www.ijert.org/research/comparative-analysis-wi-fi-security-protocols-IJERTV2IS121127.pdf In recent years, various wireless LAN technologies have gained rapid popularity and Wi-Fi can be cited as most prominent or proficient technology today. Wi-Fi stands for Wireless Fidelity and it operates in the unlicensed 2.4 GHz radio spectrum, support variable data rates and it is used to define the wireless technology in the IEEE 802.11b standard. Wireless network provides many advantages like mobility, cut costs but it is coupled with many security threats such as replay attack, eaves dropping, denial of services attack etc. The threats of intrusion into the wireless network have forced user to adopt a range of security. This paper presents an analysis of the three security protocols, from the WLANs security requirements point of view. In this paper, we discuss the wireless security protocols with details about the encryption & authentication mechanism used and their limitations.

A survey on wireless security protocols (WEP, WPA and WPA2/802.11i)

Computer Science and …, 2009

Wireless technology has been gaining rapid popularity for some years. Adaptation of a standard depends on the ease of use and level of security it provides. In this case, contrast between wireless usage and security standards show that the security is not keeping up with the growth paste of end user's usage. Current wireless technologies in use allow hackers to monitor and even change the integrity of transmitted data. Lack of rigid security standards has caused companies to invest millions on securing their wireless networks. There are three major types of security standards in wireless. In our previous papers which registered in ICFCC 2009 Malaysia and ICCDA 2009 Singapore [1] [2], we explained the structure of WEP and WPA as first and second wireless security protocols and discussed all their versions, problems and improvements. Now, we try to explain WPA2 versions, problems and enhancements that have done solve the WPA major weakness. Finally we make a comparison among WEP and WPA and WPA2 as all wireless security protocols in Wi-Fi technology. In the next phase we hope that we will publish a complete comparison among wireless security techniques by add the WiMax security technique and make a whole comparison among all security protocols in this area.

A Survey on Wireless Security Protocols Wi-Fi (802.11) and WiMAX (802.16)

International Conference on Computer Engineering and Technology, 3rd (ICCET 2011), 2011

Wireless technology has been gaining rapid popularity for some years. Adaptation of a standard depends on the ease of use and level of security it provides. In this case, contrast between wireless usage and security standards show that the security is not keeping up with the growth paste of end user's usage. Current wireless technologies in use allow hackers to monitor and even change the integrity of transmitted data. Lack of rigid security standards has caused companies to invest millions on securing their wireless networks. There are three major types of security standards in wireless. In our previous papers which registered in ICFCC Malaysia [1], ICCDA Singapore [2], ICCSIT China [3]. We explained the structure of WEP, WPA and WPA2 as first, second and third Wi-Fi security protocols and discussed all their versions, vulnerabilities and lacks and improvements. Now, in this paper we try to peruse the weaknesses of WPA2 as the last security protocol in Wi-Fi category and then try to make a whole picture of WiMax as a replacement of previous Wireless security protocols.

Comparative Analysis of Security and Privacy Protocols in Wireless Communication

The rapid growth of popularity in wireless technologies has led to the source of inventions for more and more resilient protocols that thwart security and privacy threats. Wi-Fi protocols have gained immense interest in present wireless technology because of their flexibility, convenience, and cost-effectiveness. Apart from these features, the protocols have to emphasize also on privacy and security for securing communications over the wireless medium. This paper highlights the various Wi-Fi protocols, from the very basic WEP to widely implemented WPA2 and the next robust WPA3. The paper also concentrates on the vulnerabilities and strengths of each protocol. Each algorithm's key generation mechanisms are unique and improved in each next technology to eradicate the previous vulnerability. The AES algorithm mitigates the susceptible nature of the RC4 algorithm in WEP and WPA in WPA2. The latest technology is WPA3, which provides a vast second defense line for networks with weak passwords rather than focusing only on encryption strength.

Wireless Security protocols Wi-Fi (802.11) and WiMAX (802.16)

Wireless technology has been gaining rapid popularity for some years. Adaptation of a standard depends on the ease of use and level of security it provides. In this case, contrast between wireless usage and security standards show that the security is not keeping up with the growth paste of end user’s usage. Current wireless technologies in use allow hackers to monitor and even change the integrity of transmitted data. Lack of rigid security standards has caused companies to invest millions on securing their wireless networks. There are three major types of security standards in wireless. In our previous papers which registered in some conferences [1][2][3][4], we explained the structure of WEP, WPA and WPA2 as first, second and third Wi-Fi security protocols and discussed all their versions, vulnerabilities and lacks and improvements. Now, in this paper we try to peruse the weaknesses of WPA2 as the last security protocol in Wi-Fi category and then try to make a whole picture of Wi...

Security Issues and Solutions in Wi-Fi

2017

In current world everyone wants to communicate without the need of a physical infrastructure, at a low cost, high speed and low power consumption. All these features made the wireless communication technology as a first choice for every individual or by any organization. For a small organization or in home networks WLAN is being widely recommendable solution. It can replace the wired LAN and offers many benefits to the market momentum. Apart from these advantages security is the fundamental aspect where research is going on. WLAN faces many security challenges especially in Wi-Fi networking. The goal of this paper is to discuss the major privacy security issues, attacks, solutions and fundamental security requirements of wireless communication.

Review of Wireless Security Protocols WEP WPA WPA220200419 114912 1v3j4tv

Lahore Lead university, 2020

Wireless technology has been increasingly popular for some year. Acceptance of wireless network depend on the case of use and level of security. Now day the most of wireless network hold over sensitive information and given access only authorized user. As a result communication network are essential implements some type of security protocol that will restrict users to who have access to network resource. To make sure the network is most secure. Must be network capable implements two concepts data privacy and data integrity. Data privacy is ensuring this when it comes to data integrity all the pocket on network are irreversible or unreadable for any universal force to sure that edited data is corrected. There are three main type of security standard in wireless. In this survey paper we discusses three most well know wireless network protocols also name WEP, WPA and WPA2. We discussed the shape of WEP and WPA, WPA2. Now we try to explain WPA2 version and problem after this to solve the major problem. At the end we make comparison among WEP and WPA and WPA2 as all wireless security protocols in Wi-Fi technology.

Common Security Protocols for Wireless Networks: A Comparative Analysis

International Journal of Psychosocial Rehabilitation

In computer networks, security is one of the most important aspects of protecting the network from various attacks. Especially in wireless networks, security can prevent unauthorized data access and save systems from potential threats. The security protocols in the wireless networks help to achieve the security process. Many protocols are designed to accomplish wireless security, which includes Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA) and WiFi Protected Access 2 (WPA2). This research paper discusses on the prominent wireless security protocols, that is, Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA) and WiFi Protected Access (WPA2) by providing a comparative analysis in terms of strengths and weaknesses of each protocol. In addition to that, the paper assesses each protocol in terms of authentication and encryption mechanisms and recommends the best wireless security protocol for a corporate network, which helps the network from unauthorized attacks.

WIRELESS LAN SECURITY (IEEE 802.11b

Special thanks to Sadia Hamid Kazi, Senior Lecturer, BRAC University for guide us to complete this work and give us time out of her busy schedules to consider this work. We also acknowledge Risat Mahmud Pathan, Senior Lecturer, BRAC University as giving us the preliminary idea of wireless network.

A comparison between wireless LAN security protocols

The paper presents an analysis of the WEP, WPA and IEEE 802.11i protocols, from the WLANs security requirements point of view. Then, they are compared by two criteria: the network security level that each one assures and their influence on the network performance.