Common Security Protocols for Wireless Networks: A Comparative Analysis

  • Rana M
  • Abdulla M
  • Arun K
N/ACitations
Citations of this article
14Readers
Mendeley users who have this article in their library.

Abstract

In computer networks, security is one of the most important aspects of protecting the network from various attacks. Especially in wireless networks, security can prevent unauthorized data access and save systems from potential threats. The security protocols in the wireless networks help to achieve the security process. Many protocols are designed to accomplish wireless security, which includes Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA) and WiFi Protected Access 2 (WPA2). This research paper discusses on the prominent wireless security protocols, that is, Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA) and WiFi Protected Access (WPA2) by providing a comparative analysis in terms of strengths and weaknesses of each protocol. In addition to that, the paper assesses each protocol in terms of authentication and encryption mechanisms and recommends the best wireless security protocol for a corporate network, which helps the network from unauthorized attacks.

Cite

CITATION STYLE

APA

Rana, M. E., Abdulla, M., & Arun, K. C. (2021). Common Security Protocols for Wireless Networks: A Comparative Analysis. In Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021) (Vol. 4). Atlantis Press. https://doi.org/10.2991/ahis.k.210913.080

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free