Comparative Analysis of Wireless Security Protocols: WEP vs WPA

Abstract

Data security in wireless network has posed as a threat that has stuck to the core of data communication from point A to point B. There have been a variety of security issues raised in wired and wireless networks and security specialists proposed a variety of solutions. The proposed security solutions in wired networks could not be successfully implemented in wireless networks to identify, authenticate and authorize users due to infrastructural and working principles of wireless networks. Data on wireless network are much exposed to threats because the network is been broadcasted unlike a wired network. Researchers have proposed WEP and WPA to provide security in wireless networks. This research is going to compare the WEP and WPA mechanism for better understanding of their working principles and security bugs.

Share and Cite:

Sari, A. and Karay, M. (2015) Comparative Analysis of Wireless Security Protocols: WEP vs WPA. International Journal of Communications, Network and System Sciences, 8, 483-491. doi: 10.4236/ijcns.2015.812043.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] Kumar, U. and Gambhir, S. (2014) A Literature Review of Security Threats to Wireless Networks. International Journal of Future Generation Communication and Networking, 7, 25-34.
http://dx.doi.org/10.14257/ijfgcn.2014.7.4.03
[2] Sari, A. (2012) Impact of Determinants on Student Performance towards Information Communication Technology in Higher Education. International Journal of Learning and Development, 2, 18-30.
http://dx.doi.org/10.5296/ijld.v2i2.1371
[3] Benton, K. (2010) The Evolution of 802.11 Wireless Security. INF 795, April 18th, 2010. UNLV Informatics, Spring.
[4] Sari, A. and Necat, B. (2012) Impact of RTS Mechanism on TORA and AODV Protocol’s Performance in Mobile Ad Hoc Networks. International Journal of Science and Advanced Technology, 2, 188-191.
[5] Lehembre, G. (2006) Wi-Fi Security—WEP, WPA and WPA2. Article Published in Number 1/2006 (14) of Hakin9.
www.hsc.fr
[6] Sari, A. and Necat, B. (2012) Securing Mobile Ad Hoc Networks against Jamming Attacks through Unified Security Mechanism. International Journal of Ad Hoc, Sensor & Ubiquitous Computing, 3, 79-94.
http://dx.doi.org/10.5121/ijasuc.2012.3306
[7] Bulbul, H.I., Batmaz, I. and Ozel, M. (2008) Wireless Network Security: Comparison of WEP (Wired Equivalent Privacy) Mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) Security Protocols. Proceedings of the 1st International Conference on Forensic Applications and Techniques, Information, and Multimedia and Workshop, Adelaide, 21-23 January 2008.
http://dx.doi.org/10.4108/e-forensics.2008.2654
[8] Sari, A. and Onursal, O. (2013) Role of Information Security in E-Business Operations. International Journal of Information Technology and Business Management, 3, 90-93.
[9] Arockiam, L. and Vani, B. (2010) A Survey of Denial of Service Attacks and Its Countermeasures on Wireless Network. International Journal on Computer Science and Engineering, 2, 1563-1571.
[10] Sari, A. (2014) Security Approaches in IEEE 802.11 MANET—Performance Evaluation of USM and RAS. International Journal of Communications, Network, and System Sciences, 7, 365-372.
http://dx.doi.org/10.4236/ijcns.2014.79038
[11] Gutjahr, A. (2012) Wired Equivalent Privacy (WEP) Functionality, Weak Points, Attacks.
[12] Sari, A. (2014) Security Issues in RFID Middleware Systems: A Case of Network Layer Attacks: Proposed EPC Implementation for Network Layer Attacks. Transactions on Networks & Communications, 2, 1-6.
[13] Tews, E. (2007) Attacks on the Wep Protocol. Cryptology ePrint Archive, Report 2007/471.
[14] Sari, A., Rahnama, B. and Caglar, E. (2014) Ultra-Fast Lithium Cell Charging for Mission Critical Applications. Transactions on Machine Learning and Artificial Intelligence, 2, 11-18.
http://dx.doi.org/10.14738/tmlai.25.430
[15] Frankel, S., Eydt, B., Owens, L. and Scarfone, K. (2007) Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i. National Institute of Standards and Technology, NIST 800-97.
http://csrc.nist.gov/publications/nistpubs/800-97/SP800-97.pdf
[16] Sari, A. (2014) Economic Impact of Higher Education Institutions in a Small Island: A Case of TRNC. Global Journal of Sociology, 4, 41-45.
[17] Masadeh, S.R. and Turab, N. (2011) A Formal Evaluation of the Security Schemes for Wireless Networks. Research Journal of Applied Sciences, Engineering and Technology, 3, 910-913.
[18] Ihonen, M., Salo, A. and Timonen, T. (2009) 802.11 Security Protocols, Seminar Report. Laboratory of Communications Software, Lappeenranta University of Technology, Lappeenranta.
[19] Mishra, A. and Arbaugh, W.A. (2002) An Initial Security Analysis of The IEEE 802.1X Standard. Technical Report CS-TR-4328 and UMIACS-TR-2002-10. Department of Computer Science, University of Maryland Institute for Advanced Computer Studies, College Park.
[20] Sari, A. (2015) A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications. Journal of Information Security, 6, 142-154.
http://dx.doi.org/10.4236/jis.2015.62015
[21] Chen, J.-C., Jiang, M.-C. and Liu, Y.-W. (2005) Wireless LAN Security and IEEE 802.11i. IEEE Wireless Communications, 12, 27-36.
http://dx.doi.org/10.1109/MWC.2005.1404570
[22] Obasuyi, G. and Sari, A. (2015) Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment. International Journal of Communications, Network and System Sciences, 8, 260-273.
http://dx.doi.org/10.4236/ijcns.2015.87026
[23] Rigney, C., Willens, S., Rubens, A. and Simpson, W. (2000) Remote Authentication Dial in User Service (RADIUS). RFC 2865.
[24] Sari, A. and Caglar, E. (2015) Performance Simulation of Gossip Relay Protocol in Multi-Hop Wireless Networks. Social and Applied Sciences Journal, 7, 145-148.
[25] Chiornita, A., Gheorghe, L. and Rosner, D. (2010) A Practical Analysis of EAP Authentication Methods. 2010 9th Roedunet International Conference (RoEduNet), Sibiu, 24-26 June 2010, 31-35.
[26] Sari, A. and Mahmutoglu, H. (2013) Potential Issues and Impacts of ICT Applications through Learning Process in Higher Education. Procedia—Social and Behavioral Sciences, 89, 585-592.
http://dx.doi.org/10.1016/j.sbspro.2013.08.899
[27] Turab, N. and Masadeh, S. (2010) Recommendations Guide for WLAN Security. International Journal of ACM Jordan, 1.
[28] Sari, A. and Rahnama, B. (2013) Addressing Security Challenges in WiMAX Environment. Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, 26-28 November 2013, 454-456.
http://dx.doi.org/10.1145/2523514.2523586
[29] Miller, B. (2008) WPA2 Security: Choosing the Right WLAN Authentication Method for Homes and Enterprises. Global Knowledge.
[30] Sari, A. and Rahnama, B. (2013) Simulation of 802.11 Physical Layer Attacks in MANET. 2013 5th International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), Madrid, 5-7 June 2013, 334-337.
[31] http://www.sabc.co.za/manual/ibm/9agloss.htm
[32] Sari, A. (2014) Influence of ICT Applications on Learning Process in Higher Education. Procedia—Social and Behavioral Sciences, 116, 4939-4945.
http://dx.doi.org/10.1016/j.sbspro.2014.01.1053
[33] Edney, J. and Arbaugh, W.A. (2003) Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Addison-Wesley, Boston.
[34] Sari, A. (2015) Lightweight Robust Forwarding Scheme for Multi-Hop Wireless Networks. International Journal of Communications, Network and System Sciences, 8, 19-28.
http://dx.doi.org/10.4236/ijcns.2015.83003
[35] Sari, A. (2015) Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite. International Journal of Communications, Network and System Sciences, 8, 29-42.
http://dx.doi.org/10.4236/ijcns.2015.83004
[36] Rahnama, B., Sari, A. and Makvandi, R. (2013) Countering PCIe Gen. 3 Data Transfer Rate Imperfection Using Serial Data Interconnect. 2013 International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), Konya, 9-11 May 2013, 579-582.

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.