CSEIT1953127 | Received : 20 June 2019 | Accepted : 10 July 2019 | July-August -2019 [ 5 (4) : 28-35 ]
International Journal of Scientific Research in Computer Science, Engineering and Information Technology
© 2019 IJSRCSEIT | Volume 5 | Issue 4 | ISSN : 2456-3307
DOI : https://doi.org/10.32628/CSEIT1953127
28
Review on Wireless Security Protocols (WEP, WPA, WPA2 & WPA3)
Dr. B. Indira Reddy, V. Srikanth
Department of Information Technology, Sreenidhi Institute of Science and Technology, Hyderabad, India
ABSTRACT
Wireless networks have posed a threat in Data Security that has stuck to the core of data communication
between two points. Absence of inflexible security measures has made numerous organizations contribute
millions to verify their systems. Development of different security conventions for Wireless LANs has been
given in this paper. Also, vulnerabilities of WEP/WPA/WPA2/WPA3 have been discussed and how the
wireless networks are attacked using the design flaws present in these Wireless Security Protocols. The use of
different tools and programming languages used for testing the strength of the protocols. Tools like nmap,
zenmap, aircrack-ng, etc., are used in the Linux environment to practically demonstrate the attacks against
these networks using WEP/WPA/WPA2/WPA3 protocols. The solutions for the shortcomings in WEP has
been applied in WPA, similarly WPA2 and WPA3.
Keywords : Wired Equivalent Privacy, Wi-Fi Protected Access, TKIP (Temporal key Integrity Protocol),
CCMP (Counter mode with Cipher block Chaining Message Authentication Code), SAE (Simultaneous
Authentication of Equals),WPA3
I. INTRODUCTION
IEEE characterized 802.11 Wireless LAN Standards,
expected to enable remote association of workstations
to their base LAN. WLAN application speaks to a
developing specialty in the market, the innovation on
which it is based begun to be utilized additionally for
another application, that of conveying Broadband
Wireless Access (BWA) to open systems. The primary
reason for making IEEE Standards were made in a
diverse way to deal with the physical layer like
various frequencies and distinctive encoding
strategies. WLAN conventions indicate the
utilization of 802.2 for sensible connection control
(LLC) segment of the data link layer. In WLANs,
security is accomplished by encrypting the
information. Without Encryption, some other remote
devices can sniff the traffic in the system. The three
noteworthy security methodologies are referenced
underneath:
• WEP (Wired Equivalent Privacy)
• WPA (Wi-Fi Protected Access)
• WPA2 (Wi-Fi Protected Access, ver 2)
II. METHODS AND MATERIAL
WEP (Wired Equivalent Privacy)
WEP is intended to give security of wired LAN by
encryption, utilizing RC4 algorithm with different
sides of information correspondence.
SENDER’S SIDE:
WEP utilizes four operations to encode and send the
information. In initial step secret key is utilized in
WEP calculation is 40-bit along with 24-bit
Initialization Vector (IV) which is concatenated to