Paper Title
Study Of Vulnerabilities Of WLAN Security Protocols

In this era of seamless connectivity, wireless communication is indispensible. Today, most of our communication devices support Wi-Fi connectivity to fulfil our ‘basic’ need of staying connected to the ‘grid’. Wireless communication gives us the advantage of mobility. But the tradeoffs are the reduced security. For someone to hack into a wired network he should have a wired access to the network which is quite difficult, but anyone can listen in on Wi-Fi packets being transmitted via air. Most of the fraudulent activities concerning the internet are carried over by unauthorized use of wireless access points. These vulnerable WLANs need to be secured robustly. To secure the WLANs we must use the most secure technology possible. To determine this we must know the technologies available, their strengths and vulnerabilities. WLAN protocols currently used are WPA, WPA2. This paper aims to study and compare these protocols with respect to the strength of encryption techniques, security protocols and authentication techniques. The outcome of which will help us determine the best possible security measures to be implemented to secure WLANs established in homes and business enterprises.