We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Research on Wi-Fi Security Protocols

by Saurabh Malgaonkar, Rohan Patil, Aishwarya Rai, Aastha Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 164 - Number 3
Year of Publication: 2017
Authors: Saurabh Malgaonkar, Rohan Patil, Aishwarya Rai, Aastha Singh
10.5120/ijca2017913601

Saurabh Malgaonkar, Rohan Patil, Aishwarya Rai, Aastha Singh . Research on Wi-Fi Security Protocols. International Journal of Computer Applications. 164, 3 ( Apr 2017), 30-36. DOI=10.5120/ijca2017913601

@article{ 10.5120/ijca2017913601,
author = { Saurabh Malgaonkar, Rohan Patil, Aishwarya Rai, Aastha Singh },
title = { Research on Wi-Fi Security Protocols },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 164 },
number = { 3 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 30-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume164/number3/27465-2017913601/ },
doi = { 10.5120/ijca2017913601 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:10:17.333742+05:30
%A Saurabh Malgaonkar
%A Rohan Patil
%A Aishwarya Rai
%A Aastha Singh
%T Research on Wi-Fi Security Protocols
%J International Journal of Computer Applications
%@ 0975-8887
%V 164
%N 3
%P 30-36
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless local area networks (WLANs) with the gateway to internet services are becoming popular as they are fast, cost effective, flexible and easy to use. There are some challenges of security and for IT administrators the choice of security protocol is a critical issue. The main motive is to know about threats in the wireless security and be aware about the disadvantages of wireless security protocols. There is also a comparative analysis of WEP, WPA and WPA2. The check on the authentication of all 3 protocols by implying the legendary attack vector scripts i.e. Air crack set of tools is done. The test was conducted on Back Track operating system which is considered as dedicated pentesting operating system. In the test result, it was found out that WEP is the weakest, to which WPA was a temporary solution and WPA2 is a very solid and long term solution..

References
  1. J. WELCH , S. D. LATHROP , A Survey of 802.11a Wireless Security Threats and Security Mechanisms. United States Military Academy West Point , New York, ( 2003), http://www.itoc.usma.edu/Documents/ ITOC TR-2003-101 (G6).pdf.
  2. J. C. CHEN , M. C. JIANG , Y. W. LIU , Wireless LAN security and IEEE 802.11i. IEEE Wireless Communications , ( 2005) , vol. 12, no. 1, pp. 27–36.
  3. R. PRODANOVIC , D. SIMIC , Holistic Approach to WEP Protocol in Securing Wireless Network Infrastructure. Com SIS , Vol. 3, No. 2, pp. 97–113, ( 2006)
  4. C. HE , J. C. MITCHELL , Security Analysis and Improvements for IEEE 802.11i. Stanford, USA, (2004), http://www.isoc.org/isoc/conferences/ndss/05/proceedings/papers/NDSS05-1107.pdf
  5. WEP Fix using RC4 Fast Packet Keying. RSA Laboratories,(2002), http://www.comms.scitech.susx.ac.uk/fft/crypto/wep.pdf
  6. White paper: Testing for Wi-Fi Protected Access ( WPA) inWLAN Access Points. Net-O2 Technologies, (2004), http://whitepapers.zdnet.co.uk/0,39025942,60152756p,00.html
  7. W. HAN , D. ZHENG , K. CHEN , Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i. Cryptology ePrint Archive , (2006), http://eprint.iacr.org/2006/129.pdf
  8. M. ARUNESH , A. W. ARBAUGH , An Initial Analysis of the IEEE 802.1X Standard. Maryland, (2002),http://www.cs.umd.edu/∼waa/1x.pdf
  9. "Network Simulator 2", http://www.linuxjournal.com/article/5929,December 2015.
Index Terms

Computer Science
Information Sciences

Keywords

Network security security protocols WEP WPA WPA2 WiFi Security