A Comparitive Analysis of Wireless Security Protocols (WEP And WPA2)
Authors/Creators
Description
Wireless local area networks (WLANs) are become popular as they are fast, cost effective, flexible and easy
to use. There are some challenges of security and for IT administrators the choice of security protocol is a
critical issue. The main motive of this paper is to make the non-specialist reader knowledgeable about
threats in the wireless security and make them aware about the disadvantages of wireless security
protocols. WEP (Wired Equivalent privacy), WPA (Wi-Fi Protected Access) and RSN (Robust Security
Network) security protocols are defined and examined here. This security protocols are compared with the
common.
This paper is a comparative analysis of WEP, WPA and WPA2. We have tried to perform and check
authentication of all 3 protocols by implying the legendary attack vector scripts i.e. Air crack set of tools.
The test was conducted on Back Track operating system which is considered as dedicated pentesting
operating system. In the test result, we found out that WEP is the weakest, to which WPA was a temporary
solution and WPA2 is a very solid and long term solution.
This paper is a mixture of wireless security weaknesses and counter measures to the problems faced until
recently. After reading this paper the non specialist reader will have complete review and awareness about
the wireless security and vulnerabilities involved with it.
Files
4314ijans01.pdf
Files
(558.3 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:266ac5ec1eac4db3038243d1655ab56a
|
558.3 kB | Preview Download |
Additional details
Identifiers
Related works
- Documents
- https://airccse.org/journal/ijans/papers/4314ijans01.pdf (URL)
Dates
- Copyrighted
-
2014
References
- [1] SANS Institute Reading Room site "The Evolution of wireless security in 802.11 networks: WEP, WPA and 802.11 standards". [2] Alexander Gutahr "wired Equivalent Privacy (WEP) Functionality, weak points, Attacks". [3] Scott Fluhrer, Itsik Martin and Adi Shamir "Weakness in Key Scheduling Algorithm oor RC4". [4] Bearnard Menezes "network Security and Cryptography. [5] G. Zepnep Gurkas, A. Halim Zaim, M. Ali Aydin "Security Mechanisms and Their Performance Impacts On wireless Local Area Networks. [6] http://www.aircrack-ng.org/ [7] Sebastin bohn and Stephan Grob. 2006. An Automated system interoperability test bed for WPA and WPA2 IEEE Xplore [8] White Paper July 2008. WLAN Security Today: Wireless more secure than wired. Siemens Enterprise Communications. [9] John S.Park & Derrick Decoy, 2003. WLAN Security: Current and Future, Wireless LAN deployment improves users" mobility, but it also brings a range of security issues that affect emerging standards and related technologies IEEE computer society. [10] Karen Scafone, Derrick Dicoi Matthew Sexton & Cyrus Tibbs July 2008, Guide to Security Legacy IEEE 802.11 Wireless Networks NIST Special Publication 800-48 Revision 1. [11] Recommendations Cisco Systems.