Comparison and Analysis of Existing Security Protocols in Wireless Networks
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 6
Abstract
Today over the past few years, there has been a rapid growth in the use of wireless networks. Since they have introduced in the mid 1990s, they have proliferated among home users and have taken over organizations whether or not they are authorized. Users want to secure their important information; companies want to transfer their sensible data over WLAN, that’s why lots of people are doing research on WLAN to improve the security. For Security purpose different kinds of protocols are available. But fast development in codes, standards and technology gives hackers an opportunity not only to hack and steal the important information but also to change the integrity of transmitted data aver wireless network. In this case, contrast between the usage of wireless networks and security standards show that the security s not keeping up with the growth pace of end user’s usage. Lack of rigid security standards has caused many companies to invest millions an securing their wireless networks. Today there exist different kinds of tools and programs inbuilt in operating system. By using them and analysing weaknesses of protocol used, cracking of protocol is easy. Researchers have proposed three main security protocols: WEP, WPA and WPA2 to provide security in wireless networks. This research is going to compare the WEP and WPA encryption mechanism for better understanding of their working principles and security bugs. We will also study in this paper about how security protocols authenticate the users. The major part in this thesis is to show how easy it is to crack the security protocols of wireless networks with a set of software in windows also. For this purpose, we will use the vendor script named aircrack-ng and commview software which helps in showing the procedures for hacking.
Authors and Affiliations
Kirti Rana, Aakanksha Jain
MIMO-OFDM and IDMA scheme in underwater communication
The past three decades have seen a growing interest in UWA communications because of its applications in marine research, marine commercial operations, the offshore oil industry, oceanography and defense. However the ab...
Chromatic Prime Number for Circular Embedded Graph of the Tensor Product Graph
The Chromatic number of tensor product (G ⊗ H) of G and H has vertex set V(G) and V(H). In this paper, we introduced chromatic prime number on circular embedded graph of tensor product.
A Survey paper on face detection and recognization with Genetic Algorithm
In this digital world Face recognition in video has got wide focus as a covert method for surveillance to enhance security and reliability in variety of application domains (e.g., car accidents, airports, traffic, Terro...
Effects of the Addition of Pistachio Shell Particles on the Properties of Polyurethane Matrix Composite
In this research, a composite material-based polyurethane matrix with natural resources is prepared via the casting method and the effects of the weight fractions (2.5-12.5) wt% of pistachio shell particles on the prope...
An Approach for Certificate Less Key Management with Energy Based Routing Protocol
In dynamic Wireless sensor networks, we enhance the Certificateless-effective key management (CL-EKM) protocol for secure communication with Efficient Energy System. We are going to find the proper value for the Tbackof...