Manuscript Number : CSEIT1953127
Review on Wireless Security Protocols (WEP, WPA, WPA2 & WPA3)
Authors(2) :-Dr. B. Indira Reddy, V. Srikanth Wireless networks have posed a threat in Data Security that has stuck to the core of data communication between two points. Absence of inflexible security measures has made numerous organizations contribute millions to verify their systems. Development of different security conventions for Wireless LANs has been given in this paper. Also, vulnerabilities of WEP/WPA/WPA2/WPA3 have been discussed and how the wireless networks are attacked using the design flaws present in these Wireless Security Protocols. The use of different tools and programming languages used for testing the strength of the protocols. Tools like nmap, zenmap, aircrack-ng, etc., are used in the Linux environment to practically demonstrate the attacks against these networks using WEP/WPA/WPA2/WPA3 protocols. The solutions for the shortcomings in WEP has been applied in WPA, similarly WPA2 and WPA3.
Dr. B. Indira Reddy Wired Equivalent Privacy, Wi-Fi Protected Access, TKIP (Temporal key Integrity Protocol), CCMP (Counter mode with Cipher block Chaining Message Authentication Code), SAE (Simultaneous Authentication of Equals),WPA3 Publication Details Published in : Volume 5 | Issue 4 | July-August 2019 Article Preview
Department of Information Technology, Sreenidhi Institute of Science and Technology, Hyderabad, India
V. Srikanth
Department of Information Technology, Sreenidhi Institute of Science and Technology, Hyderabad, India
Date of Publication : 2019-07-30
License: This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 28-35
Manuscript Number : CSEIT1953127
Publisher : Technoscience Academy
Journal URL : https://res.ijsrcseit.com/CSEIT1953127
Citation Detection and Elimination |
|
|
BibTeX | RIS | CSV