Abstract

This paper investigates a number of security protocols, which are used in wireless networks. Security protocols like Wired Equivalent Privacy (WEP), WEP2, Wi-Fi Protected Access (WPA) and WPA2, which are protocols developed mainly to work within the IEEE 802.11 standard. Analysis of the protocols advantages and disadvantages are introduced (vulnerabilities and problems), from the encryption and decryption point of view. A number of measures are proposed to counter most of the known vulnerabilities that face the wireless networks security today. The proposed measures can be used in a number of security related fields

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call