Common Security Protocols for Wireless Networks: A Comparative Analysis
- https://doi.org/10.2991/ahis.k.210913.080How to use a DOI?
- Wireless Security Protocols, Wired Equivalent Protocol (WEP), WiFi Protected Access (WPA), WiFi Protected Access 2 (WPA2)
In computer networks, security is one of the most important aspects of protecting the network from various attacks. Especially in wireless networks, security can prevent unauthorized data access and save systems from potential threats. The security protocols in the wireless networks help to achieve the security process. Many protocols are designed to accomplish wireless security, which includes Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA) and WiFi Protected Access 2 (WPA2). This research paper discusses on the prominent wireless security protocols, that is, Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA) and WiFi Protected Access (WPA2) by providing a comparative analysis in terms of strengths and weaknesses of each protocol. In addition to that, the paper assesses each protocol in terms of authentication and encryption mechanisms and recommends the best wireless security protocol for a corporate network, which helps the network from unauthorized attacks.
- © 2021, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Muhammad Ehsan Rana AU - Mohamed Abdulla AU - Kuruvikulam Chandrasekaran Arun PY - 2021 DA - 2021/09/13 TI - Common Security Protocols for Wireless Networks: A Comparative Analysis BT - Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021) PB - Atlantis Press SP - 632 EP - 638 SN - 2589-4900 UR - https://doi.org/10.2991/ahis.k.210913.080 DO - https://doi.org/10.2991/ahis.k.210913.080 ID - Rana2021 ER -