scispace - formally typeset
Proceedings ArticleDOI

A survey on wireless security protocols (WEP, WPA and WPA2/802.11i)

Reads0
Chats0
TLDR
This paper tries to explain WPA2 versions, problems and enhancements that have done solve the WPA major weakness, and makes a comparison among WEP and WPA and WEP2 as all wireless security protocols in Wi-Fi technology.
Abstract
Wireless technology has been gaining rapid popularity for some years. Adaptation of a standard depends on the ease of use and level of security it provides. In this case, contrast between wireless usage and security standards show that the security is not keeping up with the growth paste of end user's usage. Current wireless technologies in use allow hackers to monitor and even change the integrity of transmitted data. Lack of rigid security standards has caused companies to invest millions on securing their wireless networks. There are three major types of security standards in wireless. In our previous papers which registered in ICFCC 2009 Malaysia and ICCDA 2009 Singapore [1] [2], we explained the structure of WEP and WPA as first and second wireless security protocols and discussed all their versions, problems and improvements. Now, we try to explain WPA2 versions, problems and enhancements that have done solve the WPA major weakness. Finally we make a comparison among WEP and WPA and WPA2 as all wireless security protocols in Wi-Fi technology. In the next phase we hope that we will publish a complete comparison among wireless security techniques by add the WiMax security technique and make a whole comparison among all security protocols in this area.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends

TL;DR: The security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues, and the state of the art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer are discussed.
Journal ArticleDOI

A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

TL;DR: In this article, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer.
Journal ArticleDOI

Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks

TL;DR: It is shown that the impact of ghost is very large and that it can facilitate a variety of threats including denial of service and replay attacks, and several recommendations on how to localize and withstand the ghost and other related attacks in ZigBee networks are proposed.
Journal ArticleDOI

Design of an OFDM Physical Layer Encryption Scheme

TL;DR: A new encryption scheme implemented at the physical layer of wireless networks employing orthogonal frequency-division multiplexing (OFDM) is presented, shown to perform better in terms of search space, key rate, and complexity in comparison with other OFDM physical layer encryption schemes.
Journal ArticleDOI

Mobile microscopy as a screening tool for oral cancer in India: A pilot study.

TL;DR: Results indicated that the instrument successfully collected images of sufficient quality to enable remote diagnoses that show concordance with existing techniques, and further studies will evaluate the effectiveness of oral cancer screening with mobile microscopy by minimally trained technicians in low-resource settings.
References
More filters
Journal ArticleDOI

Security in wireless sensor networks

TL;DR: This paper surveys the state of art in securing wireless sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection.
Journal ArticleDOI

Weaknesses in the temporal key hash of WPA

TL;DR: Given a few RC4 packet keys in WPA it is possible to find the Temporal Key (TK) and the Message Integrity Check (MIC) key and this shows that parts of WPA are weak on their own.
Book

Security for wireless sensor networks

TL;DR: Broadcast Authentication, Pairwise Key Establishment, Secure Localization, and Improving Pairwisekey Establishment Using Deployment Knowledge are reviewed.
Proceedings ArticleDOI

Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA)

TL;DR: This paper explains the structure of WEP as a first wireless security standard, tries to explain all of WPA versions and problems with the best solutions, and makes a comparison between WEP and WPA.
Related Papers (5)