Abstract

Data security in wireless network has posed as a threat that has stuck to the core of data communication from point A to point B. There have been a variety of security issues raised in wired and wireless networks and security specialists proposed a variety of solutions. The proposed security solutions in wired networks could not be successfully implemented in wireless networks to identify, authenticate and authorize users due to infrastructural and working principles of wireless networks. Data on wireless network are much exposed to threats because the network is been broadcasted unlike a wired network. Researchers have proposed WEP and WPA to provide security in wireless networks. This research is going to compare the WEP and WPA mechanism for better understanding of their working principles and security bugs.

Highlights

  • Wireless communication helps exchange information form one point to another or more points

  • This paper would try to highlight the different mechanisms of data protection or security in wireless network or environment

  • The wireless Media Access Control (MAC) payload frame is generated by putting the initialization vector (IV)

Read more

Summary

Introduction

Wireless communication helps exchange information form one point to another or more points. Data availability can be achieved by well management of the computing environment, and integrity via data backups, and verification methods. These methods help to ensure the readiness of data. WEP and WPA are the basic data and network security mechanisms provided to ensure security in wireless network environment. This paper would try to highlight the different mechanisms of data protection or security in wireless network or environment. The WEP standard specification supports a 40-bit key length while the non-standard specification provides a 128 and 256-bit key length in data encryption

Encryption Process of the WEP
Decryption Process of the WEP
Security Vulnerabilities in WEP
Common Attacks on WEP
Reencrypt and inject
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.