2017
DOI: 10.5120/ijca2017913601
|View full text |Cite
|
Sign up to set email alerts
|

Research on Wi-Fi Security Protocols

Abstract: Wireless local area networks (WLANs) with the gateway to internet services are becoming popular as they are fast, cost effective, flexible and easy to use. There are some challenges of security and for IT administrators the choice of security protocol is a critical issue. The main motive is to know about threats in the wireless security and be aware about the disadvantages of wireless security protocols. There is also a comparative analysis of WEP, WPA and WPA2. The check on the authentication of all 3 protoco… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 3 publications
0
4
0
1
Order By: Relevance
“…After scanning, then carry out attacks using penetration testing tools that are suitable for testing Wi-Fi network security. From this process will get the results of a successful attack (Malgaonkar et al, 2017). After getting the results of penetration testing, the researcher will apply anticipation of a successful attack.…”
Section: Methodsmentioning
confidence: 99%
“…After scanning, then carry out attacks using penetration testing tools that are suitable for testing Wi-Fi network security. From this process will get the results of a successful attack (Malgaonkar et al, 2017). After getting the results of penetration testing, the researcher will apply anticipation of a successful attack.…”
Section: Methodsmentioning
confidence: 99%
“…WPA-2 is more robust and reliable; it uses Advanced Encryption Standard (AES) instead of RC-4. It uses CCMP protocols for authentication [ 182 ]. CCMP stands for Counter Mode with Cipher Block Chaining Message Authentication Code Protocol.…”
Section: Wban Technical Issuesmentioning
confidence: 99%
“…RADIUS is used to secure extensive networks by securing centralized management through access control. As there is no centralized authentication server in small offices (SOHO), the Pre-shared key is used to provide security to the network, enabling the users to get access by providing a password or a key [15]. Extensible Authentication Protocol (EAP) is the protocol used by the client during the authentication process.…”
Section: Authenticationmentioning
confidence: 99%