Analyzing Attacking methods on Wi-Fi wireless networks pertaining (WEP, WPA-WPA2) security protocols

1Citations
Citations of this article
29Readers
Mendeley users who have this article in their library.

Abstract

The technology of wireless network systems has eased the possibility to communicate utilising the electromagnetic waves which leads to eliminating the major barriers in portable communications. Wireless networks have a vital role in the current era that all devices; rangingfrom local modems to organizational equipment, are using various coding approaches to exchange data on the network. However, since the wireless networks utilise the air, as the communication medium, that results to confront more vulnerabilities. If an attacker penetratesa wireless network, he/she would be capable to attack users connected to the network. Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and WPA2 are the common security protocols that play the most significant role in local and organizational wireless communication. Accordingly, this study analysed the attacking methods in WEP, WPA, and WPA2 coding protocols. The main objective of the current study is to identify the security vulnerabilities related to these three protocols and define optimal solutions to improve the security of wireless networks against the attackers. The findings presented in this study wouldsupport users to maintain security of their home wireless networks as well as employees to secure the organizational network.

Cite

CITATION STYLE

APA

Zaidan, D. T. (2021). Analyzing Attacking methods on Wi-Fi wireless networks pertaining (WEP, WPA-WPA2) security protocols. Periodicals of Engineering and Natural Sciences, 9(4), 1093–1101. https://doi.org/10.21533/pen.v9i4.2545

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free