Review on Wireless Security Protocols (WEP, WPA, WPA2 & WPA3)

Authors(2) :-Dr. B. Indira Reddy, V. Srikanth

Wireless networks have posed a threat in Data Security that has stuck to the core of data communication between two points. Absence of inflexible security measures has made numerous organizations contribute millions to verify their systems. Development of different security conventions for Wireless LANs has been given in this paper. Also, vulnerabilities of WEP/WPA/WPA2/WPA3 have been discussed and how the wireless networks are attacked using the design flaws present in these Wireless Security Protocols. The use of different tools and programming languages used for testing the strength of the protocols. Tools like nmap, zenmap, aircrack-ng, etc., are used in the Linux environment to practically demonstrate the attacks against these networks using WEP/WPA/WPA2/WPA3 protocols. The solutions for the shortcomings in WEP has been applied in WPA, similarly WPA2 and WPA3.

Authors and Affiliations

Dr. B. Indira Reddy
Department of Information Technology, Sreenidhi Institute of Science and Technology, Hyderabad, India
V. Srikanth
Department of Information Technology, Sreenidhi Institute of Science and Technology, Hyderabad, India

Wired Equivalent Privacy, Wi-Fi Protected Access, TKIP (Temporal key Integrity Protocol), CCMP (Counter mode with Cipher block Chaining Message Authentication Code), SAE (Simultaneous Authentication of Equals),WPA3

  1. Arash Habibi Lashkari, F. Towhidi, R. S. Hoseini, “Wired Equivalent Privacy(WEP)”, ICFCC Kuala Lumpur Conference, Published by IEEE Computer Society, Indexed by THAMSON ISI, 2009.
  2. S.vinjosh Reddy, K.Rijutha, K.Sai Ramani, Sk Mohammad Ali, CH.Pradeep Reddy, “Wireless Hacking - A WiFi Hack By Cracking WEP”, 201O 2nd International Conference on Education Technology and Computer (ICETC)
  3. Arash Habibi Lashkari, Masood Mansoori, Amir Seyed Danesh “Wired Equivalent Privacy (Wep) Versus Wi-Fi Protected Access (Wpa)”2009 International Conference On Signal Processing Systems
  4. Arash Habibi Lashkari, Mir Mohammad Seyed Danesh, Behrang Samadi,”A Survey on Wireless Security Protocols(WEP, WPA and WPA2/802.11i)
  5. Samia Alblwi, Khalil Shujaee ,”A Survey on Wireless Security Protocol WPA2”, Int'l Conf. Security and Management | SAM'17 |
  6. Yonglei Liu, Zhigang Jin, Ying Wang, “Survey on security scheme and attacking methods of WPA/WPA2”
  7. Norzaidi Baharudin, Fakariah Hani Mohd Ali, Mohamad Yusof Darus, Norkhushaini Awang, “Wireless Intruder Detection System (WIDS) in Detecting De-Authentication and Disassociation Attacks in IEEE 802.11”
  8. Mathy Vanhoef, Frank Piessens,” Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2”
  9. Dr.T.Pandikumar1, Mohammed Ali Yesuf,”Wi-Fi Security and Test Bed Implementation for WEP and WPA Cracking”
  10. BabitaDagar, Neha Goyal,” Integrating Enhanced Security Measures in WEP/WPA/WPA2-PSK”
  11. Mahmoud Khasawneh, Izadeen Kajman, Rashed Alkhudaidy, and Anwar Althubyani,” A Survey on Wi-Fi Protocols:WPA and WPA2”
  12. Vipin Poddar, Hitesh Choudhary,” A Comparitive Analysis Of Wireless Security Protocols (Wep And Wpa2)”
  13. Muthu Pavithran. S, Pavithran. S,” Advanced Attack Against Wireless Networks Wep, Wpa/Wpa2-Personal And Wpa/Wpa2-Enterprise”
  14. Kirti Rana, Aakanksha Jain, “Comparison and Analysis of Existing Security Protocols in Wireless Networks”
  15. Ashish Garg,” A Novel Approach to Secure WEP by Introducing an Additional layer over RC4”
  16. Pranav S. Ambavkar, Pranit U. Patil, Dr.B.B.Meshram, Prof. Pamu Kumar Swamy,” WPA Exploitation In The World Of Wireless Network”
  17. Tomoaki Sato, Phichet Moungnoue, and Masa-aki Fukase,” Compatible WEP Algorithm for Improved Cipher Strength and High-Speed Processing”
  18. Mathy Vanhoef, Eyal Ronen, “Dragonblood: A Security Analysis of WPA3’s SAE Handshake”
  19. Arif Sari, Mehmet Karay,” Comparative Analysis of Wireless Security Protocols: WEP vs WPA”
  20. V.A.A.S.Perera, E.A.M.K.B.Ekanayake, S.S. Shurane, P.A.Isuru Udayanga, J.P.Maharajage, R.M.C.Bandara, Dhishan Dhammearatchi, ” Enhancement WPA2 protocol with WTLS to certify security in large scale organizations inner access layer Wi-Fi media associated devices”
  21. Kashish Monga, Vishal Arora, Ashish Kumar, “Analyzing the behavior of WP A with modification”, 2015 IEEE International Conference on Communication Networks (ICCN)
  22. Jose Perez, “A Survey Of Wireless Network Security Protocols”

Publication Details

Published in : Volume 5 | Issue 4 | July-August 2019
Date of Publication : 2019-07-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 28-35
Manuscript Number : CSEIT1953127
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Dr. B. Indira Reddy, V. Srikanth, "Review on Wireless Security Protocols (WEP, WPA, WPA2 & WPA3)", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 4, pp.28-35, July-August-2019. Available at doi : https://doi.org/10.32628/CSEIT1953127
Journal URL : https://res.ijsrcseit.com/CSEIT1953127 Citation Detection and Elimination     |      |          | BibTeX | RIS | CSV

Article Preview