Review on Wireless Security Protocols (WEP, WPA, WPA2 & WPA3)

Authors

  • Dr. B. Indira Reddy  Department of Information Technology, Sreenidhi Institute of Science and Technology, Hyderabad, India
  • V. Srikanth  Department of Information Technology, Sreenidhi Institute of Science and Technology, Hyderabad, India

DOI:

https://doi.org//10.32628/CSEIT1953127

Keywords:

Wired Equivalent Privacy, Wi-Fi Protected Access, TKIP (Temporal key Integrity Protocol), CCMP (Counter mode with Cipher block Chaining Message Authentication Code), SAE (Simultaneous Authentication of Equals),WPA3

Abstract

Wireless networks have posed a threat in Data Security that has stuck to the core of data communication between two points. Absence of inflexible security measures has made numerous organizations contribute millions to verify their systems. Development of different security conventions for Wireless LANs has been given in this paper. Also, vulnerabilities of WEP/WPA/WPA2/WPA3 have been discussed and how the wireless networks are attacked using the design flaws present in these Wireless Security Protocols. The use of different tools and programming languages used for testing the strength of the protocols. Tools like nmap, zenmap, aircrack-ng, etc., are used in the Linux environment to practically demonstrate the attacks against these networks using WEP/WPA/WPA2/WPA3 protocols. The solutions for the shortcomings in WEP has been applied in WPA, similarly WPA2 and WPA3.

References

  1. Arash Habibi Lashkari, F. Towhidi, R. S. Hoseini, “Wired Equivalent Privacy(WEP)”, ICFCC Kuala Lumpur Conference, Published by IEEE Computer Society, Indexed by THAMSON ISI, 2009.
  2. S.vinjosh Reddy, K.Rijutha, K.Sai Ramani, Sk Mohammad Ali, CH.Pradeep Reddy, “Wireless Hacking - A WiFi Hack By Cracking WEP”, 201O 2nd International Conference on Education Technology and Computer (ICETC)
  3. Arash Habibi Lashkari, Masood Mansoori, Amir Seyed Danesh “Wired Equivalent Privacy (Wep) Versus Wi-Fi Protected Access (Wpa)”2009 International Conference On Signal Processing Systems
  4. Arash Habibi Lashkari, Mir Mohammad Seyed Danesh, Behrang Samadi,”A Survey on Wireless Security Protocols(WEP, WPA and WPA2/802.11i)
  5. Samia Alblwi, Khalil Shujaee ,”A Survey on Wireless Security Protocol WPA2”, Int'l Conf. Security and Management | SAM'17 |
  6. Yonglei Liu, Zhigang Jin, Ying Wang, “Survey on security scheme and attacking methods of WPA/WPA2”
  7. Norzaidi Baharudin, Fakariah Hani Mohd Ali, Mohamad Yusof Darus, Norkhushaini Awang, “Wireless Intruder Detection System (WIDS) in Detecting De-Authentication and Disassociation Attacks in IEEE 802.11”
  8. Mathy Vanhoef, Frank Piessens,” Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2”
  9. Dr.T.Pandikumar1, Mohammed Ali Yesuf,”Wi-Fi Security and Test Bed Implementation for WEP and WPA Cracking”
  10. BabitaDagar, Neha Goyal,” Integrating Enhanced Security Measures in WEP/WPA/WPA2-PSK”
  11. Mahmoud Khasawneh, Izadeen Kajman, Rashed Alkhudaidy, and Anwar Althubyani,” A Survey on Wi-Fi Protocols:WPA and WPA2”
  12. Vipin Poddar, Hitesh Choudhary,” A Comparitive Analysis Of Wireless Security Protocols (Wep And Wpa2)”
  13. Muthu Pavithran. S, Pavithran. S,” Advanced Attack Against Wireless Networks Wep, Wpa/Wpa2-Personal And Wpa/Wpa2-Enterprise”
  14. Kirti Rana, Aakanksha Jain, “Comparison and Analysis of Existing Security Protocols in Wireless Networks”
  15. Ashish Garg,” A Novel Approach to Secure WEP by Introducing an Additional layer over RC4”
  16. Pranav S. Ambavkar, Pranit U. Patil, Dr.B.B.Meshram, Prof. Pamu Kumar Swamy,” WPA Exploitation In The World Of Wireless Network”
  17. Tomoaki Sato, Phichet Moungnoue, and Masa-aki Fukase,” Compatible WEP Algorithm for Improved Cipher Strength and High-Speed Processing”
  18. Mathy Vanhoef, Eyal Ronen, “Dragonblood: A Security Analysis of WPA3’s SAE Handshake”
  19. Arif Sari, Mehmet Karay,” Comparative Analysis of Wireless Security Protocols: WEP vs WPA”
  20. V.A.A.S.Perera, E.A.M.K.B.Ekanayake, S.S. Shurane, P.A.Isuru Udayanga, J.P.Maharajage, R.M.C.Bandara, Dhishan Dhammearatchi, ” Enhancement WPA2 protocol with WTLS to certify security in large scale organizations inner access layer Wi-Fi media associated devices”
  21. Kashish Monga, Vishal Arora, Ashish Kumar, “Analyzing the behavior of WP A with modification”, 2015 IEEE International Conference on Communication Networks (ICCN)
  22. Jose Perez, “A Survey Of Wireless Network Security Protocols”

Downloads

Published

2019-07-30

Issue

Section

Research Articles

How to Cite

[1]
Dr. B. Indira Reddy, V. Srikanth, " Review on Wireless Security Protocols (WEP, WPA, WPA2 & WPA3), IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 4, pp.28-35, July-August-2019. Available at doi : https://doi.org/10.32628/CSEIT1953127