Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)

Common Security Protocols for Wireless Networks: A Comparative Analysis

Authors
Muhammad Ehsan Rana, Mohamed Abdulla, Kuruvikulam Chandrasekaran Arun
Corresponding Author
Muhammad Ehsan Rana
Available Online 13 September 2021.
DOI
10.2991/ahis.k.210913.080How to use a DOI?
Keywords
Wireless Security Protocols, Wired Equivalent Protocol (WEP), WiFi Protected Access (WPA), WiFi Protected Access 2 (WPA2)
Abstract

In computer networks, security is one of the most important aspects of protecting the network from various attacks. Especially in wireless networks, security can prevent unauthorized data access and save systems from potential threats. The security protocols in the wireless networks help to achieve the security process. Many protocols are designed to accomplish wireless security, which includes Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA) and WiFi Protected Access 2 (WPA2). This research paper discusses on the prominent wireless security protocols, that is, Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA) and WiFi Protected Access (WPA2) by providing a comparative analysis in terms of strengths and weaknesses of each protocol. In addition to that, the paper assesses each protocol in terms of authentication and encryption mechanisms and recommends the best wireless security protocol for a corporate network, which helps the network from unauthorized attacks.

Copyright
© 2021, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)
Series
Atlantis Highlights in Computer Sciences
Publication Date
13 September 2021
ISBN
10.2991/ahis.k.210913.080
ISSN
2589-4900
DOI
10.2991/ahis.k.210913.080How to use a DOI?
Copyright
© 2021, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Muhammad Ehsan Rana
AU  - Mohamed Abdulla
AU  - Kuruvikulam Chandrasekaran Arun
PY  - 2021
DA  - 2021/09/13
TI  - Common Security Protocols for Wireless Networks: A Comparative Analysis
BT  - Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)
PB  - Atlantis Press
SP  - 632
EP  - 638
SN  - 2589-4900
UR  - https://doi.org/10.2991/ahis.k.210913.080
DO  - 10.2991/ahis.k.210913.080
ID  - Rana2021
ER  -