Skip to main content

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 420))

Abstract

Wireless Network (Wi-Fi) becomes extremely popular over the world on the lastly two decades. Nowadays, most people are using the wireless networks for online banking and shopping. It also allows people to share information and communicate with each other whenever and wherever they are. Moreover, it has the advantages of flexibility and freedom of mobility and enables smart phones and laptops to provide a rapid and easy access to information. All of that makes the protection of the wireless network highly demanded to be existed. Therefore, security should be applied on Wi-Fi networks to keep users’ confidentiality and privacy. Hence, different protocols have been developed and applied. Nowadays, Wi-Fi Protected Access (WPA, and WPA2) protocols are considered as the most applied protocols in wireless networks over the world. In this paper, we discuss the advantages, vulnerability, and the weaknesses of both of these protocols. This paper ends up with some suggestions on how to improve the functionality of these protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mylonas, P., Mavridis, I.P., Androulakis, A.-I.E., Halkias, A.B.: Real-life paradigms of wireless network security attacks (2011)

    Google Scholar 

  2. Sukhija, S., Gupta, S.: Wireless Network Security Protocols A Comparative Study (January 2012)

    Google Scholar 

  3. Lehembre, G.: Wi-Fi security – WEP, WPA and WPA2 (June 2005)

    Google Scholar 

  4. Mathews, M., Hunt, R.: Evolution of Wireless LAN Security Architecture to IEEE 802.11i (WPA2). In: Proceedings of the fourth IASTED Asian Conference on Communication Systems and Networks (2007)

    Google Scholar 

  5. Lehembre, G.: ―Wi-Fi security –WEP, WPA and WPA2‖, Article published in number 1/2006 (14) of hakin9 (January 2006), Publication on, www.hsc.fr

  6. Turab, N., Masadeh, S.: ―Recommendations guide for WLAN Security. The International Journal of ACM 1(1) (March 2010)

    Google Scholar 

  7. Park, S.H., Ganz, A., Ganz, Z.: ―Security protocol for IEEE 802.11 wireless local area network. Mobile Networks and Applications 3 (1998)

    Google Scholar 

  8. Katz, F.H.: ―WPA vs. WPA2: Is WPA2 Really an Improvement on WPA? In: 2010 4th Annual Computer Security Conference (CSC 2010), Coastal Carolina University, Myrtle Beach, SC, April 15-16 (2010)

    Google Scholar 

  9. Frankel, S., Eydt, B., Owens, L., Scarfone, K.: Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i, NIST Special Publication 800-97, National Institute of Standards and Technology (2007)

    Google Scholar 

  10. Lashkari, A.H., Danesh, M.M.S., Samadi, B.: FCSIT. A survey on wireless security protocols (WEP, WPA and WPA2/802.11i). In: 2nd IEEE International Conference on Computer Science and Information Technology, ICCSIT (2009)

    Google Scholar 

  11. Benton, K.: ―The evolution of 802.11 wireless security‖, INF 795. UNLV Informatics-Spring (April 18, 2010)

    Google Scholar 

  12. Beck, M., Tews, E.: ―Practical attacks against WEP and WPA‖. In: WiSec 2009: Proceedings of the Second ACM Conference on Wireless Network Security. ACM, New York (2009)

    Google Scholar 

  13. Arockiam, L., Vani, B.: ―A Survey of Denial of Service Attacks and its Countermeasures on Wireless Network‖. International Journal on Computer Science and Engineering 2(5), 1563–1571 (2010)

    Google Scholar 

  14. Arockiam, L., Vani, B.: ―A Survey of Denial of Service Attacks and its Countermeasures on Wireless Network. International Journal on Computer Science and Engineering 2(5), 1563–1571 (2010)

    Google Scholar 

  15. Bulbul, H.I., Batmaz, I., Ozel, M.: Wireless Network Security: Comparison of WEP (WiredEquivalent Privacy) Mechanism, WPA (Wi-Fi ProtectedAccess) and RSN (Robust Security Network) Security Protocols, e-Forensics 2008, Adelaide, Australia, January 21-23 (2008)

    Google Scholar 

  16. Miller, B.: WPA2 Security: Choosing the Right WLAN Authentication Method for Homes and Enterprises. Global Knowledge (2008)

    Google Scholar 

  17. Macmichael, J.L.: Auditing Wi-Fi Protected Access (WPA) Pre-Shared Key Mode. Linux Journal (137), 56, 58–60 (2005)

    Google Scholar 

  18. Cracking Wireless. Ryan Curtin Ryan at, igglybob.com

  19. De Rango, F., Lentini, D.C., Marano, S.: Static and dynamic 4-wayhandshake solutions to avoid denial of service attack in Wi-Fi protected access and IEEE 802. I li. EURASIP 1. Wire!’ Commun. Netw. (2) (April 2006)

    Google Scholar 

  20. Scarfone, K., Dicoi, D., Sexton, M., Tibbs, C.: Recommendations of the National Institute of Standards and Technology. Guide to Securing Legacy IEEE 802.11 Wireless Networks (July 2008)

    Google Scholar 

  21. Wang, Y., Jin, Z., Zhao, X.: Practical Defence against WEP and WPA-PSK Attack for WLAN (September 2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Khasawneh, M., Kajman, I., Alkhudaidy, R., Althubyani, A. (2014). A Survey on Wi-Fi Protocols: WPA and WPA2. In: MartĂ­nez PĂ©rez, G., Thampi, S.M., Ko, R., Shu, L. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. Communications in Computer and Information Science, vol 420. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54525-2_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-54525-2_44

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-54524-5

  • Online ISBN: 978-3-642-54525-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics