Comparative Analysis of Wireless Security Protocols: WEP vs WPA
Author(s) -
Arif Sarı,
Mehmet Karay
Publication year - 2015
Publication title -
international journal of communications network and system sciences
Language(s) - English
Resource type - Journals
eISSN - 1913-3723
pISSN - 1913-3715
DOI - 10.4236/ijcns.2015.812043
Subject(s) - wireless network , computer science , wireless , computer network , computer security , variety (cybernetics) , wireless wan , network security , wireless transport layer security , wi fi , wi fi array , telecommunications , artificial intelligence
Data security in wireless network has posed as a threat that has stuck to the core of data communication from point A to point B. There have been a variety of security issues raised in wired and wireless networks and security specialists proposed a variety of solutions. The proposed security solutions in wired networks could not be successfully implemented in wireless networks to identify, authenticate and authorize users due to infrastructural and working principles of wireless networks. Data on wireless network are much exposed to threats because the network is been broadcasted unlike a wired network. Researchers have proposed WEP and WPA to provide security in wireless networks. This research is going to compare the WEP and WPA mechanism for better understanding of their working principles and security bugs.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom