Comparative Analysis of Wireless Security Protocols and Issues

Abstract

Almost every electronic device is connected to the internet today. We have different mechanisms of connecting the devices for feasible communication that maybe wired or wireless. Also, wirelesses LANs are most popular and frequently used because of their cost effectiveness, easy deployment and configuration. A lot of data is being generated and transferred every day, which includes sensitive information. Network security consists of various policies and practices which prevent and monitor proper safeguard of network systems against misuse, unauthorized access of the information. Though different security techniques are implemented to protect this kind of information, but the threat of hackers is always lurking there, to intercept or intrude the security by finding loopholes in the wireless communication. This paper focuses on the existing wireless security protocols such as Wired Equivalent Piracy(WEP), Wi-Fi Protected Access(WPA), Wi-Fi Protected Access 2(WPA2) and their security issues. Farhaan Noor Hamdani"Comparative Analysis of Wireless Security Protocols and Issues" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd17130.pdf http://www.ijtsrd.com/computer-science/computer-network/17130/comparative-analysis-of-wireless-security-protocols-and-issues/farhaan-noor-hamdani

Authors and Affiliations

Keywords

Related Articles

Personalization Aspects Affecting Users' Intention to Revisit Social Networking Site

Personalization features are adopted to reduce information overload, to attract users and leveraging business by online social networking web portals in recent years. Still, less attention has been paid to design aspects...

Web Based Tool for Managing Paddy Irrigation Water User Group

In many countries, the Internet has become an element in people’s daily life, offering new possibilities for information access and sharing. In this new technological and information age, water is becoming a source of...

Effect of Forensic Accounting on Accountability Evidence from Ministry of Finance, Awka

The main objective of the study is to determine the effect of forensic accounting on accountability in Anambra state ministry of finance, Awka, the specific objectives are to ascertain the extent forensic accounting prac...

Good Governance Implications on Principals' Effectiveness in Public Secondary Schools in the South West Region of Cameroon

This research titled "Good Governance Implications on Principals' Effectiveness in Public Secondary Schools PSS in the South West Region SWR of Cameroon", sought to examine the extent to which good governance practice p...

Converting Plastic to Useful Energy Resources

In India the grown of population and industries are very rapid in urban area and therefore plastic waste problem is generated. The characteristics of plastic waste depend on factors such as lifestyle, climate, tradition,...

Download PDF file
  • EP ID EP389856
  • DOI -
  • Views 66
  • Downloads 0

How To Cite

(2018). Comparative Analysis of Wireless Security Protocols and Issues. International Journal of Trend in Scientific Research and Development, 2(5), 1591-1596. https://europub.co.uk./articles/-A-389856