Comparative Analysis of Wireless Security Protocols: WEP vs WPA

Data security in wireless network has posed as a threat that has stuck to the core of data communication from point A to point B. There have been a variety of security issues raised in wired and wireless networks and security specialists proposed a variety of solutions. The proposed security solutions in wired networks could not be successfully implemented in wireless networks to identify, authenticate and authorize users due to infrastructural and working principles of wireless networks. Data on wireless network are much exposed to threats because the network is been broadcasted unlike a wired network. Researchers have proposed WEP and WPA to provide security in wireless networks. This research is going to compare the WEP and WPA mechanism for better understanding of their working principles and security bugs.

[1]  Arif Sari,et al.  Addressing security challenges in WiMAX environment , 2013, SIN.

[2]  Sapna Gambhir,et al.  A Literature Review of Security Threats to Wireless Networks , 2014 .

[4]  Arif Sari Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks , 2014 .

[5]  Arif Sari Securing Mobile Ad-Hoc Networks Against Jamming Attacks Through Unified Security Mechanism , 2012 .

[6]  Arif Sari Lightweight Robust Forwarding Scheme for Multi-Hop Wireless Networks , 2015 .

[7]  Kevin Benton,et al.  The Evolution of 802.11 Wireless Security , 2010 .

[8]  Sheila E. Frankel,et al.  Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i , 2007 .

[9]  Allan C. Rubens,et al.  Remote Authentication Dial In User Service (RADIUS) , 1997, RFC.

[10]  Arif Sari Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite , 2015 .

[11]  Halil-Ibrahim Bulbul,et al.  Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols , 2008, e-Forensics '08.

[12]  William A. Arbaugh,et al.  Real 802.11 Security: Wi-Fi Protected Access and 802.11i , 2003 .

[13]  Arif Sari,et al.  Countering PCIe Gen. 3 data transfer rate imperfection using serial data interconnect , 2013, 2013 The International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE).

[14]  William A. Arbaugh,et al.  An Initial Security Analysis of the IEEE 802.1X Standard , 2002 .

[15]  Arif Sari Security Approaches in IEEE 802.11 MANET —Performance Evaluation of USM and RAS , 2014 .

[16]  Arif Sari,et al.  A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications , 2015 .

[17]  Jyh-Cheng Chen,et al.  Wireless LAN security and IEEE 802.11i , 2005, IEEE Wireless Communications.

[18]  Erik Tews,et al.  Attacks on the WEP protocol , 2007, IACR Cryptol. ePrint Arch..

[19]  Arif Sari,et al.  Simulation of 802.11 Physical Layer Attacks in MANET , 2013, 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks.

[20]  Daniel Rosner,et al.  A practical analysis of EAP authentication methods , 2010, 9th RoEduNet IEEE International Conference.

[21]  Arif Sari,et al.  Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment , 2015 .

[22]  Nidal M. Turab,et al.  A Formal Evaluation of the Security Schemes for Wireless Networks , 2011 .

[23]  L Arockiam,et al.  A Survey of Denial of Service Attacks and it’s Counter measures on Wireless Network (Flooding attacks) , 2011 .

[24]  Arif Sari,et al.  Potential issues and impacts of ICT applications through learning process in higher education , 2013 .

[25]  Arif Sari,et al.  Ultra-fast Lithium cell charging architecture for Mission Critical Applications , 2014 .

[26]  Arif Sari WITHDRAWN: Influence of ICT Applications on Learning Process in Higher Education , 2014 .