International Journal of Advance Computational Engineering and Networking (IJACEN)
Follow Us On :
current issues
Volume-12,Issue-4  ( Apr, 2024 )
Past issues
  1. Volume-12,Issue-3  ( Mar, 2024 )
  2. Volume-12,Issue-2  ( Feb, 2024 )
  3. Volume-12,Issue-1  ( Jan, 2024 )
  4. Volume-11,Issue-12  ( Dec, 2023 )
  5. Volume-11,Issue-11  ( Nov, 2023 )
  6. Volume-11,Issue-10  ( Oct, 2023 )
  7. Volume-11,Issue-9  ( Sep, 2023 )
  8. Volume-11,Issue-8  ( Aug, 2023 )
  9. Volume-11,Issue-7  ( Jul, 2023 )
  10. Volume-11,Issue-6  ( Jun, 2023 )

Statistics report
Jul. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 136
Paper Published : 1596
No. of Authors : 4179
  Journal Paper

Paper Title :
Study Of Vulnerabilities Of WLAN Security Protocols

Author :Pratim Kar, Sumedh Koshe, Aniket Gosavi, Shweta Tripathi

Article Citation :Pratim Kar ,Sumedh Koshe ,Aniket Gosavi ,Shweta Tripathi , (2013 ) " Study Of Vulnerabilities Of WLAN Security Protocols " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 15-18, Volume-1,Issue-8

Abstract : In this era of seamless connectivity, wireless communication is indispensible. Today, most of our communication devices support Wi-Fi connectivity to fulfil our ‘basic’ need of staying connected to the ‘grid’. Wireless communication gives us the advantage of mobility. But the tradeoffs are the reduced security. For someone to hack into a wired network he should have a wired access to the network which is quite difficult, but anyone can listen in on Wi-Fi packets being transmitted via air. Most of the fraudulent activities concerning the internet are carried over by unauthorized use of wireless access points. These vulnerable WLANs need to be secured robustly. To secure the WLANs we must use the most secure technology possible. To determine this we must know the technologies available, their strengths and vulnerabilities. WLAN protocols currently used are WPA, WPA2. This paper aims to study and compare these protocols with respect to the strength of encryption techniques, security protocols and authentication techniques. The outcome of which will help us determine the best possible security measures to be implemented to secure WLANs established in homes and business enterprises.

Type : Research paper

Published : Volume-1,Issue-8


Copyright: © Institute of Research and Journals

| PDF |
Viewed - 27
| Published on 2014-01-18
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World