Comparison and Analysis of Existing Security Protocols in Wireless Networks
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 6
Abstract
Today over the past few years, there has been a rapid growth in the use of wireless networks. Since they have introduced in the mid 1990s, they have proliferated among home users and have taken over organizations whether or not they are authorized. Users want to secure their important information; companies want to transfer their sensible data over WLAN, that’s why lots of people are doing research on WLAN to improve the security. For Security purpose different kinds of protocols are available. But fast development in codes, standards and technology gives hackers an opportunity not only to hack and steal the important information but also to change the integrity of transmitted data aver wireless network. In this case, contrast between the usage of wireless networks and security standards show that the security s not keeping up with the growth pace of end user’s usage. Lack of rigid security standards has caused many companies to invest millions an securing their wireless networks. Today there exist different kinds of tools and programs inbuilt in operating system. By using them and analysing weaknesses of protocol used, cracking of protocol is easy. Researchers have proposed three main security protocols: WEP, WPA and WPA2 to provide security in wireless networks. This research is going to compare the WEP and WPA encryption mechanism for better understanding of their working principles and security bugs. We will also study in this paper about how security protocols authenticate the users. The major part in this thesis is to show how easy it is to crack the security protocols of wireless networks with a set of software in windows also. For this purpose, we will use the vendor script named aircrack-ng and commview software which helps in showing the procedures for hacking.
Authors and Affiliations
Kirti Rana, Aakanksha Jain
Direct current control based bidirectional AC/DC single phase converter in a Grid-Tied Micro grid Systems
This paper presents a novel simplified direct current control strategy for the bidirectional ac/dc single phase converter in a micro grid system. Based on the simplified Pulse Width Modulation (PWM) strategy, a feasible...
Physico-chemical changes in bottle gourd (Lagenariasiceraria) juice during storage
The present study was designed to evaluate physico-chemical changes in bottle gourd juice during storage. The fresh bottle gourds were procured from the Agriculture Farm, Haryana Agriculture University, Hisar, India. Th...
Estimation of Application Maintenance cost using COCOMO81
Constructive Cost Model is one of the CE models which contribute three different models namely basic, intermediate and detailed model. Maintenance of software is very much important so as to increase the functionality o...
Differential Protection of Power Transformer Using Simulink
In this research work we propose a simple and effective technique based on the Clark’s transformation. Which avoiding the mal-operation of differential protection relays during inrush currents and trip signal generated...
Improvement of Shear Strength of Sandy Silt Soil by Mixing Optimum Percentage of Fly Ash: A Study
Strength of soil is very important parameter for any civil construction. Soft and weak soil is more liable to differential settlements, less shear strength and high compressibility. Hence it is necessary to check and im...