WPA 2 (Wi-Fi Protected Access 2) Security Enhancement: Analysis

Authors

  • Shamim Ahmed

  • A.K.M. Nazmus Sakib

  • Samiur Rahman

Keywords:

WPA 2, Key, Authentication, Hash Function, DH Algorithm, PRNG

Abstract

WPA and WPA2 (Wi-Fi Protected Access) is a certification program developed by the Wi-Fi Alliance to indicate compliance with the security protocol created by the WiFi Alliance to secure wireless networks. The Alliance defined the protocol in response to several weaknesses researchers had found in the previous system: Wired Equivalent Privacy (WEP). Many sophisticated authentication and encryption techniques have been embedded into WPA2 but it still facing a lot of challenging situations. In this paper we discuss the benefit of WPA2, its vulnerability

Downloads

How to Cite

Shamim Ahmed, A.K.M. Nazmus Sakib, & Samiur Rahman. (2012). WPA 2 (Wi-Fi Protected Access 2) Security Enhancement: Analysis . Global Journal of Computer Science and Technology, 12(6), 83–89. Retrieved from https://computerresearch.org/index.php/computer/article/view/480

WPA 2 (Wi-Fi Protected Access 2) Security Enhancement: Analysis

Published

2012-03-15