International Journal of Future Generation Communication and Networking Vol.7, No.4 (2014), pp.25-34 http://dx.doi.org/10.14257/ijfgcn.2014.7.4.03 ISSN: 2233-7857 IJFGCN Copyright ⓒ 2014 SERSC A Literature Review of Security Threats to Wireless Networks Umesh Kumar 1 and Sapna Gambhir 2 YMCA University of Science and Technology, India umesh554@gmail.com,sapnagambhir@gmail.com Abstract In the recent years we have huge development of wireless technology. We are presently getting more subject to wireless technology. As we know wireless networks have broadcast nature so there are different security issues in the wireless communication. The security conventions intended for the wired systems can't be extrapolated to wireless systems. Hackers and intruders can make utilization of the loopholes of the wireless communication. In this paper we will mull over the different remote security dangers to wireless systems and conventions at present accessible like Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2). WPA2 is more hearty security convention as compared with WPA on the grounds that it utilizes the Advanced Encryption Standard (AES) encryption. There are few issues in WPA2 like it is helpless against brute force attack and MIC bits could be utilized by programmer to compare it with the decoded content. So in this paper we will concentrate on different sorts of wireless security dangers. Keywords: Wired Equivalent Privacy, Wi-Fi Protected Access, Wi-Fi Protected Access2, Temporal Key Integrity Protocol, and Advance Encryption Standard 1. Introduction Wireless communication is the exchange of data between two or more points that are not joined by an electrical transmitter. The most well-known wireless technologies use electromagnetic wireless telecommunications, for example, radio. With radio waves distances could be short, for example, a couple of meters for TV remote control, or the extent that thousands or even a huge number of kilometers for profound space radio communications. It includes different sorts of fixed, mobile and portable applications, including two-way radios, cell phones, individual PDAs, and wireless networking [1]. Figure 1 shows an example of wireless communication. The various available wireless technologies differ in local availability, coverage range and performance, and in some circumstances, users must be able to employ multiple connection types and switch between them. Supporting technologies include: Wi-Fi is a wireless local area network that enables portable computing devices to connect easily to the Internet. Standardized as IEEE 802.11 a/b/g/n, Wi-Fi approaches speeds of some types of wired Ethernet. Wi-Fi has become normal standard for access in private homes, within offices, and at public hotspots. Cellular Data Service offers coverage within a range of 10-15 miles from the nearest cell site. Speeds have increased as technologies have evolved, from earlier technologies such as GSM, CDMA and GPRS, to 3G networks such as W-CDMA, EDGE or CDMA2000. Online Version Only. Book made by this file is ILLEGAL.