Abstract:
This paper investigates a number of security protocols, which are used in wireless networks. Security protocols like Wired Equivalent Privacy (WEP), WEP2, Wi-Fi Protected...Show MoreMetadata
Abstract:
This paper investigates a number of security protocols, which are used in wireless networks. Security protocols like Wired Equivalent Privacy (WEP), WEP2, Wi-Fi Protected Access (WPA) and WPA2, which are protocols developed mainly to work within the IEEE 802.11 standard. Analysis of the protocols advantages and disadvantages are introduced (vulnerabilities and problems), from the encryption and decryption point of view. A number of measures are proposed to counter most of the known vulnerabilities that face the wireless networks security today. The proposed measures can be used in a number of security related fields
Date of Conference: 20-22 February 2006
Date Added to IEEE Xplore: 08 May 2006
Print ISBN:89-5519-129-4