Comparison and Analysis of Existing Security Protocols in Wireless Networks
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 6
Abstract
Today over the past few years, there has been a rapid growth in the use of wireless networks. Since they have introduced in the mid 1990s, they have proliferated among home users and have taken over organizations whether or not they are authorized. Users want to secure their important information; companies want to transfer their sensible data over WLAN, that’s why lots of people are doing research on WLAN to improve the security. For Security purpose different kinds of protocols are available. But fast development in codes, standards and technology gives hackers an opportunity not only to hack and steal the important information but also to change the integrity of transmitted data aver wireless network. In this case, contrast between the usage of wireless networks and security standards show that the security s not keeping up with the growth pace of end user’s usage. Lack of rigid security standards has caused many companies to invest millions an securing their wireless networks. Today there exist different kinds of tools and programs inbuilt in operating system. By using them and analysing weaknesses of protocol used, cracking of protocol is easy. Researchers have proposed three main security protocols: WEP, WPA and WPA2 to provide security in wireless networks. This research is going to compare the WEP and WPA encryption mechanism for better understanding of their working principles and security bugs. We will also study in this paper about how security protocols authenticate the users. The major part in this thesis is to show how easy it is to crack the security protocols of wireless networks with a set of software in windows also. For this purpose, we will use the vendor script named aircrack-ng and commview software which helps in showing the procedures for hacking.
Authors and Affiliations
Kirti Rana, Aakanksha Jain
Design of Reconfigurable OFDM and CDMA Transceiver Based On FPGA
The rapid expansion in digital Wireless communications results in a demand for systems that are reliable and have a high spectral efficiency. To fulfill these demands, the multicarrier modulation scheme, often called Or...
Design and Implementation of the Propeller for Marine Propulsion Using Pi Controller
Marine vehicles propulsion control is a challenging task in water transport system. Marine vehicle propulsion system uses a propeller power, shaft, and motor, sensors, guidance and navigation system in which thrusters a...
A Secured framework for SACM in Cloud Computing
The paradigm that offers Cloud computing is advantages in economic aspects, by reducing flexible computing, capabilities limitless computing power and time to market. To use the full potential of cloud computing like tr...
slugElliptic Curve Cryptography Based Algorithm for Privacy Preserving in Data Mining
Data mining is used to extract or “mine” knowledge from large amounts of data base. However, data is often distributed among different locations. In terms of privacy and security issues data mining techniques are recent...
slugA Survey on Lane Marking Techniques
A lane is part of a carriage way (roadway) that is designated for use by a single line of vehicles, to control and guide drivers and reduce traffic conflicts. Most public roads (highways) have at least two lanes, one fo...