A survey on wireless security protocols (WEP, WPA and WPA2/802.11i)

Wireless technology has been gaining rapid popularity for some years. Adaptation of a standard depends on the ease of use and level of security it provides. In this case, contrast between wireless usage and security standards show that the security is not keeping up with the growth paste of end user's usage. Current wireless technologies in use allow hackers to monitor and even change the integrity of transmitted data. Lack of rigid security standards has caused companies to invest millions on securing their wireless networks. There are three major types of security standards in wireless. In our previous papers which registered in ICFCC 2009 Malaysia and ICCDA 2009 Singapore [1] [2], we explained the structure of WEP and WPA as first and second wireless security protocols and discussed all their versions, problems and improvements. Now, we try to explain WPA2 versions, problems and enhancements that have done solve the WPA major weakness. Finally we make a comparison among WEP and WPA and WPA2 as all wireless security protocols in Wi-Fi technology. In the next phase we hope that we will publish a complete comparison among wireless security techniques by add the WiMax security technique and make a whole comparison among all security protocols in this area.

[1]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[2]  Arash Habibi Lashkari,et al.  Wired Equivalent Privacy (WEP) , 2009, 2009 International Conference on Future Computer and Communication.

[3]  Bhagyavati,et al.  Wireless security techniques: an overview , 2004, InfoSecCD '04.

[4]  Kouichi Sakurai,et al.  Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i , 2006, Mobility '06.

[5]  Halil-Ibrahim Bulbul,et al.  Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols , 2008, e-Forensics '08.

[6]  Kjell Jørgen Hole,et al.  Weaknesses in the temporal key hash of WPA , 2004, MOCO.

[7]  William A. Arbaugh,et al.  An Initial Security Analysis of the IEEE 802.1X Standard , 2002 .

[8]  Y. Challal,et al.  Enhanced WEP: An efficient solution to WEP threats , 2005, Second IFIP International Conference on Wireless and Optical Communications Networks, 2005. WOCN 2005..

[9]  Ross Hytnen,et al.  An analysis of wireless security , 2006 .

[10]  James Kempf Wireless Internet Security - Architecture and Protocols , 2008 .

[11]  John L. MacMichael Auditing wi-fi protected access (WPA) pre-shared key mode , 2005 .

[12]  Arash Habibi Lashkari,et al.  Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA) , 2009, 2009 International Conference on Signal Processing Systems.