CSEIT1953127 | Received : 20 June 2019 | Accepted : 10 July 2019 | July-August -2019 [ 5 (4) : 28-35 ] International Journal of Scientific Research in Computer Science, Engineering and Information Technology © 2019 IJSRCSEIT | Volume 5 | Issue 4 | ISSN : 2456-3307 DOI : https://doi.org/10.32628/CSEIT1953127 28 Review on Wireless Security Protocols (WEP, WPA, WPA2 & WPA3) Dr. B. Indira Reddy, V. Srikanth Department of Information Technology, Sreenidhi Institute of Science and Technology, Hyderabad, India ABSTRACT Wireless networks have posed a threat in Data Security that has stuck to the core of data communication between two points. Absence of inflexible security measures has made numerous organizations contribute millions to verify their systems. Development of different security conventions for Wireless LANs has been given in this paper. Also, vulnerabilities of WEP/WPA/WPA2/WPA3 have been discussed and how the wireless networks are attacked using the design flaws present in these Wireless Security Protocols. The use of different tools and programming languages used for testing the strength of the protocols. Tools like nmap, zenmap, aircrack-ng, etc., are used in the Linux environment to practically demonstrate the attacks against these networks using WEP/WPA/WPA2/WPA3 protocols. The solutions for the shortcomings in WEP has been applied in WPA, similarly WPA2 and WPA3. Keywords : Wired Equivalent Privacy, Wi-Fi Protected Access, TKIP (Temporal key Integrity Protocol), CCMP (Counter mode with Cipher block Chaining Message Authentication Code), SAE (Simultaneous Authentication of Equals),WPA3 I. INTRODUCTION IEEE characterized 802.11 Wireless LAN Standards, expected to enable remote association of workstations to their base LAN. WLAN application speaks to a developing specialty in the market, the innovation on which it is based begun to be utilized additionally for another application, that of conveying Broadband Wireless Access (BWA) to open systems. The primary reason for making IEEE Standards were made in a diverse way to deal with the physical layer like various frequencies and distinctive encoding strategies. WLAN conventions indicate the utilization of 802.2 for sensible connection control (LLC) segment of the data link layer. In WLANs, security is accomplished by encrypting the information. Without Encryption, some other remote devices can sniff the traffic in the system. The three noteworthy security methodologies are referenced underneath: WEP (Wired Equivalent Privacy) WPA (Wi-Fi Protected Access) WPA2 (Wi-Fi Protected Access, ver 2) II. METHODS AND MATERIAL WEP (Wired Equivalent Privacy) WEP is intended to give security of wired LAN by encryption, utilizing RC4 algorithm with different sides of information correspondence. SENDER’S SIDE: WEP utilizes four operations to encode and send the information. In initial step secret key is utilized in WEP calculation is 40-bit along with 24-bit Initialization Vector (IV) which is concatenated to