In computer networks, security is one of the most important aspects of protecting the network from various attacks. Especially in wireless networks, security can prevent unauthorized data access and save systems from potential threats. The security protocols in the wireless networks help to achieve the security process. Many protocols are designed to accomplish wireless security, which includes Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA) and WiFi Protected Access 2 (WPA2). This research paper discusses on the prominent wireless security protocols, that is, Wired Equivalent Privacy (WEP), WiFi Protected Access (WPA) and WiFi Protected Access (WPA2) by providing a comparative analysis in terms of strengths and weaknesses of each protocol. In addition to that, the paper assesses each protocol in terms of authentication and encryption mechanisms and recommends the best wireless security protocol for a corporate network, which helps the network from unauthorized attacks.
CITATION STYLE
Rana, M. E., Abdulla, M., & Arun, K. C. (2021). Common Security Protocols for Wireless Networks: A Comparative Analysis. In Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021) (Vol. 4). Atlantis Press. https://doi.org/10.2991/ahis.k.210913.080
Mendeley helps you to discover research relevant for your work.