Abstract
Wireless Network (Wi-Fi) becomes extremely popular over the world on the lastly two decades. Nowadays, most people are using the wireless networks for online banking and shopping. It also allows people to share information and communicate with each other whenever and wherever they are. Moreover, it has the advantages of flexibility and freedom of mobility and enables smart phones and laptops to provide a rapid and easy access to information. All of that makes the protection of the wireless network highly demanded to be existed. Therefore, security should be applied on Wi-Fi networks to keep users’ confidentiality and privacy. Hence, different protocols have been developed and applied. Nowadays, Wi-Fi Protected Access (WPA, and WPA2) protocols are considered as the most applied protocols in wireless networks over the world. In this paper, we discuss the advantages, vulnerability, and the weaknesses of both of these protocols. This paper ends up with some suggestions on how to improve the functionality of these protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mylonas, P., Mavridis, I.P., Androulakis, A.-I.E., Halkias, A.B.: Real-life paradigms of wireless network security attacks (2011)
Sukhija, S., Gupta, S.: Wireless Network Security Protocols A Comparative Study (January 2012)
Lehembre, G.: Wi-Fi security – WEP, WPA and WPA2 (June 2005)
Mathews, M., Hunt, R.: Evolution of Wireless LAN Security Architecture to IEEE 802.11i (WPA2). In: Proceedings of the fourth IASTED Asian Conference on Communication Systems and Networks (2007)
Lehembre, G.: ―Wi-Fi security –WEP, WPA and WPA2‖, Article published in number 1/2006 (14) of hakin9 (January 2006), Publication on, www.hsc.fr
Turab, N., Masadeh, S.: ―Recommendations guide for WLAN Security. The International Journal of ACM 1(1) (March 2010)
Park, S.H., Ganz, A., Ganz, Z.: ―Security protocol for IEEE 802.11 wireless local area network. Mobile Networks and Applications 3 (1998)
Katz, F.H.: ―WPA vs. WPA2: Is WPA2 Really an Improvement on WPA? In: 2010 4th Annual Computer Security Conference (CSC 2010), Coastal Carolina University, Myrtle Beach, SC, April 15-16 (2010)
Frankel, S., Eydt, B., Owens, L., Scarfone, K.: Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i, NIST Special Publication 800-97, National Institute of Standards and Technology (2007)
Lashkari, A.H., Danesh, M.M.S., Samadi, B.: FCSIT. A survey on wireless security protocols (WEP, WPA and WPA2/802.11i). In: 2nd IEEE International Conference on Computer Science and Information Technology, ICCSIT (2009)
Benton, K.: ―The evolution of 802.11 wireless security‖, INF 795. UNLV Informatics-Spring (April 18, 2010)
Beck, M., Tews, E.: ―Practical attacks against WEP and WPA‖. In: WiSec 2009: Proceedings of the Second ACM Conference on Wireless Network Security. ACM, New York (2009)
Arockiam, L., Vani, B.: ―A Survey of Denial of Service Attacks and its Countermeasures on Wireless Network‖. International Journal on Computer Science and Engineering 2(5), 1563–1571 (2010)
Arockiam, L., Vani, B.: ―A Survey of Denial of Service Attacks and its Countermeasures on Wireless Network. International Journal on Computer Science and Engineering 2(5), 1563–1571 (2010)
Bulbul, H.I., Batmaz, I., Ozel, M.: Wireless Network Security: Comparison of WEP (WiredEquivalent Privacy) Mechanism, WPA (Wi-Fi ProtectedAccess) and RSN (Robust Security Network) Security Protocols, e-Forensics 2008, Adelaide, Australia, January 21-23 (2008)
Miller, B.: WPA2 Security: Choosing the Right WLAN Authentication Method for Homes and Enterprises. Global Knowledge (2008)
Macmichael, J.L.: Auditing Wi-Fi Protected Access (WPA) Pre-Shared Key Mode. Linux Journal (137), 56, 58–60 (2005)
Cracking Wireless. Ryan Curtin Ryan at, igglybob.com
De Rango, F., Lentini, D.C., Marano, S.: Static and dynamic 4-wayhandshake solutions to avoid denial of service attack in Wi-Fi protected access and IEEE 802. I li. EURASIP 1. Wire!’ Commun. Netw. (2) (April 2006)
Scarfone, K., Dicoi, D., Sexton, M., Tibbs, C.: Recommendations of the National Institute of Standards and Technology. Guide to Securing Legacy IEEE 802.11 Wireless Networks (July 2008)
Wang, Y., Jin, Z., Zhao, X.: Practical Defence against WEP and WPA-PSK Attack for WLAN (September 2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Khasawneh, M., Kajman, I., Alkhudaidy, R., Althubyani, A. (2014). A Survey on Wi-Fi Protocols: WPA and WPA2. In: MartĂnez PĂ©rez, G., Thampi, S.M., Ko, R., Shu, L. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. Communications in Computer and Information Science, vol 420. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54525-2_44
Download citation
DOI: https://doi.org/10.1007/978-3-642-54525-2_44
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-54524-5
Online ISBN: 978-3-642-54525-2
eBook Packages: Computer ScienceComputer Science (R0)