A Survey on Wi-Fi Protocols: WPA and WPA2

17Citations
Citations of this article
55Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Wireless Network (Wi-Fi) becomes extremely popular over the world on the lastly two decades. Nowadays, most people are using the wireless networks for online banking and shopping. It also allows people to share information and communicate with each other whenever and wherever they are. Moreover, it has the advantages of flexibility and freedom of mobility and enables smart phones and laptops to provide a rapid and easy access to information. All of that makes the protection of the wireless network highly demanded to be existed. Therefore, security should be applied on Wi-Fi networks to keep users' confidentiality and privacy. Hence, different protocols have been developed and applied. Nowadays, Wi-Fi Protected Access (WPA, and WPA2) protocols are considered as the most applied protocols in wireless networks over the world. In this paper, we discuss the advantages, vulnerability, and the weaknesses of both of these protocols. This paper ends up with some suggestions on how to improve the functionality of these protocols. © Springer-Verlag Berlin Heidelberg 2014.

Author supplied keywords

Cite

CITATION STYLE

APA

Khasawneh, M., Kajman, I., Alkhudaidy, R., & Althubyani, A. (2014). A Survey on Wi-Fi Protocols: WPA and WPA2. In Communications in Computer and Information Science (Vol. 420 CCIS, pp. 496–511). Springer Verlag. https://doi.org/10.1007/978-3-642-54525-2_44

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free