Study of Wi-Fi Security Basing on Wireless Security Standards (WEP, WPA and WPA2)

Article Preview

Abstract:

Wi-Fi becomes increasingly popular for people who use smart phones, tablet computers and laptops frequently. It is essentially for users to understand the security problems of Wi-Fi in order to prevent information leakage. The key wireless security standards used in IEEE 802.11 are WEP, WPA and WPA2. The main purpose of this paper is to investigate the security vulnerabilities of these three standards and attempt to conclude an optimal solution for common users.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 1049-1050)

Pages:

1993-1996

Citation:

Online since:

October 2014

Authors:

Keywords:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Information on http: /standards. ieee. org.

Google Scholar

[2] V. Kumkar, A. Tiwari, P. Tiwari, A. Gupta and S. Shrawne, in: Vulnerabilities of Wireless Security Protocols (WEP and WPA2), International Journal of Advanced Research in Computer Engineering & Technology, Vol 1, Iss 2, (2012), pp.034-038.

Google Scholar

[3] F. Zhang, X. Liu, W. Ma and X. Wang, in: The Key Problems of WLAN Security, Information Security and Communications Privacy, Iss 5, (2004).

Google Scholar

[4] M. Meyers, in: Managing and Troubleshooting Networks, Network+, McGraw Hill, (2004).

Google Scholar

[5] D. Li, in: A Technology Improvement of WPA Base on WEP, Science & Technology Information, Iss 35, (2010).

Google Scholar

[6] W. Stallings and L. Brown, in: Computer Security: Principles and Practice, Prentice Hall, (2008).

Google Scholar

[7] Information on http: /www. wlanbbs. com.

Google Scholar