Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Performance Analysis of WEP and WPA2 Protocols to Ensure WLAN Security


Affiliations
1 Department of Computer Science & Engineering, Bharathidasan University, Trichy-23, India
2 Department of Computer Science, St. Joseph’s College, Trichy -2, India
     

   Subscribe/Renew Journal


Security is the major issue among the WLAN user community since users are comfortable with the mobility and portability of the mobile devices.  The ease of use makes them to concentrate on the minimum security measures like a basic authentication with a periodic change of passwords. On the other side of these technological benefits, there is always a hidden chance of intrusions on the personal and business data.   The data authentication, authorization, data integrity and confidentiality are the most used specifications for securing the wireless network. So the ultimate solution is to protect the data from all types of attack and losses. For this the user must know the types of attacks and the prevention methods. This paper analyzes the two security protocols namely RC4 and AES, which are used in WEP and WPA2 respectively.  The purpose of this paper is to give developers with little or no knowledge of cryptography the ability to understand the encryption and decryption techniques used in RC4, AES algorithms and also a comparative performance analysis methodology.


Keywords

Authentication, AES, Wireless Security, WEP, WPA, 802.1x.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 220

PDF Views: 3




  • A Performance Analysis of WEP and WPA2 Protocols to Ensure WLAN Security

Abstract Views: 220  |  PDF Views: 3

Authors

B. Vani
Department of Computer Science & Engineering, Bharathidasan University, Trichy-23, India
L. Arockiam
Department of Computer Science, St. Joseph’s College, Trichy -2, India

Abstract


Security is the major issue among the WLAN user community since users are comfortable with the mobility and portability of the mobile devices.  The ease of use makes them to concentrate on the minimum security measures like a basic authentication with a periodic change of passwords. On the other side of these technological benefits, there is always a hidden chance of intrusions on the personal and business data.   The data authentication, authorization, data integrity and confidentiality are the most used specifications for securing the wireless network. So the ultimate solution is to protect the data from all types of attack and losses. For this the user must know the types of attacks and the prevention methods. This paper analyzes the two security protocols namely RC4 and AES, which are used in WEP and WPA2 respectively.  The purpose of this paper is to give developers with little or no knowledge of cryptography the ability to understand the encryption and decryption techniques used in RC4, AES algorithms and also a comparative performance analysis methodology.


Keywords


Authentication, AES, Wireless Security, WEP, WPA, 802.1x.