International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 164 - Number 3 |
Year of Publication: 2017 |
Authors: Saurabh Malgaonkar, Rohan Patil, Aishwarya Rai, Aastha Singh |
10.5120/ijca2017913601 |
Saurabh Malgaonkar, Rohan Patil, Aishwarya Rai, Aastha Singh . Research on Wi-Fi Security Protocols. International Journal of Computer Applications. 164, 3 ( Apr 2017), 30-36. DOI=10.5120/ijca2017913601
Wireless local area networks (WLANs) with the gateway to internet services are becoming popular as they are fast, cost effective, flexible and easy to use. There are some challenges of security and for IT administrators the choice of security protocol is a critical issue. The main motive is to know about threats in the wireless security and be aware about the disadvantages of wireless security protocols. There is also a comparative analysis of WEP, WPA and WPA2. The check on the authentication of all 3 protocols by implying the legendary attack vector scripts i.e. Air crack set of tools is done. The test was conducted on Back Track operating system which is considered as dedicated pentesting operating system. In the test result, it was found out that WEP is the weakest, to which WPA was a temporary solution and WPA2 is a very solid and long term solution..