StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Wi-Fi Protected Access Work in LAN - Research Paper Example

Cite this document
Summary
The paper "The Wi-Fi Protected Access Work in LAN" discusses that regular update is an essential part of every kind of security provider. The reliable transmission of information maximizes the data-sharing process among home-based users, small and medium-level businesses, and large-scale businesses…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.8% of users find it useful
The Wi-Fi Protected Access Work in LAN
Read Text Preview

Extract of sample "The Wi-Fi Protected Access Work in LAN"

ABC Project Wi-Fi Protected Access in LAN (Local area network) Wi-Fi Protected Access in LAN (Local area network) ENGINEERINGCOMMUNICATIONCENTRE SANDFORD FLEMING B670, 35 ST. GEORGE ST., UNIV. OF TORONTO, TORONTO, ON. 2. Abstract: The Wi-Fi Protected Access (WPA) work in LAN (Local Area Network) is upcoming and very important aspect that needs to focus on getting the best protection solution to their users. Wi-Fi Protected Access (WPA) is basically the subpart of 802.11i and more effort is applied in this area to make protection in future environments. Different types of standards are applied to the achievement of a high level security. The Wi-Fi Protected Access (WPA) required protection of multi-types. It includes the protection of Data, reliable control of the access, and security of Wireless LAN. WPA is seriously focused among researchers for providing the best solutions in this field. 3. Introduction: Wi-Fi Protected Access (WPA) is beneficial for home based users, as well as business users. The formal certification is required in the field of wireless LAN communication so making the security at the highest level that is essential. In the organizations, the use of authorized access is essential for developing a connection between users. The secured connection is maintained by the organizations and authorized access is allowed. The WPA is also equally important in a home and small offices, because sharing of data is always confidential for personal home users and in SME (Small and Medium Enterprise). In a home based and small offices the Wi-Fi connection always asks for secure type of password for authorized access (Wi-Fi Alliance, 2014). The AES (Advanced Encryption Standard) is introduced for making the protection towards hardware. The three different stages of security the novel IEEE 802.11b standard, Wi-Fi Protected Access (WPA), and the IEEE 802.11i protocol. The Wi-Fi Alliance is established with the sub-part of the standard 802.11i and introduces the Wi-Fi Protected Access (WPA). The IEEE 802.11 b composed of stages, the address filtering process of Ethernet MAC (Media Access Control), Service Set Identifiers (SSID), and the Wired Equivalent Privacy (WEP) (Mathews and Hunt, 2007) 4. Background: There are solutions available that can secure the wireless LAN. Virtual Private Network (VPN) is one of the solution that is applied. A Virtual Private Network (VPN) provides a secure connection by having the services of Frame Relay, Virtual Circuits (VC) and Asynchronous Transfer Mode (ATM). The IP/Multiprotocol Label Switching (MPLS)-based VPNs are latest technology in Virtual Private Network (VPN). Different types of protocols are used for making enable the protection in VPN. Wired Equivalent Privacy (WEP) is another solution for having secure and reliable wireless network. WEP can also provide casual snoopers protection. (Wi-Fi Alliance, 2014). The technical comparison between Wi-Fi Protected Access (WPA) and Wired Equivalent Privacy (WEP) is a part of literature that explores many aspects of security. The security measures regarding the wireless network are the important issues in this growing age of information technology, the data travel across the wireless network is captured by hackers as illegal access. This is a huge loss for wireless network users and requires a rigid type of security standards and norms for communication in wireless networks in a safe environment (Lashkari, Mansoori and Danesh, 2009). WPA-PSK is an attempt to destroy the security of wireless networks, in this way a dump file and a dictionary file is thrown on the wireless network to capture the required passpharase. Algorithms are used for making the destruction of the attacked wireless network (MacMichael, 2005). The weaknesses and vulnerabilities are found and proved in wireless communication networks, after the appliance of Wi-Fi Protected Access (WPA) and Wired Equivalent Privacy (WEP). This explores the new way to the development of Wi-Fi Protected Access 2 (WPA2). The WPA 2 is a construction based on two stages, encryption and authentication. The novel standards are applied to the achievement of advance encryption techniques. For making the authentication process more effective, the key generation is used.The key generation procedure is hierarchy based where Master Key (MK), Pairwise Master Key (PMK), and Pairwise Transient Key (PTK) are generated for improving the authentication protective (Arana, 2006). The threat of DoS (Denial of Serives), like the data flooding, availability attacks, and RF jamming are some examples that can harm the wireless network due to the physical layer and WPA2 is not able to deal with such issues (Bellardo and Savage, 2003). 5. Discussion: The Wi-Fi LAN security could be achieved through VPN’s, 802.1X, and some other technologies. Wi-Fi Protected Access (WPA) will deliver the data protection in the air, the robust control of access to all kinds of users. The software installed for WPA requires the regular updates to meet with the latest threats in networking. The other source of security is the use of secure use of the wired material, and it comes under the Wireless Equivalent Privacy (WEP). Still the room is open for making improvements in the WEP for the achievement of optimal solutions (Wi-Fi Alliance, 2014). The link layer encryption is applied for making a network secure. The physical level protection is achieved through this concept of Wi-Fi protection. The polices of shared users and other related matters are established for secure and reliable processing in the Wi-Fi based LAN network. The assessment of security for Wi-Fi LAN is directed from the Wireless Equivalent Privacy (WEP) to Wi-Fi Protected Access (WPA) (Yasir and Yang, 2004). The issues are still there in the IEEE 802.11 in the process of address filtering. The network sniffing tool captures the traffic for address filtration. The spoofing attacks are common in network, so this activity needs more effort to improve and meet the security measures in an efficient way. The prob request can become the reason to harm the SSID (Berghel and Uecker, 2004). 6. Conclusion: The paper is about the Wi-Fi Protected Access (WPA), the efforts in this particular area are also part discussion. It is analyzed that there are many sources available for making the Wi-Fi LAN secure and having a reliable communication. As the rapid changes are part of information technology, so the network always demands latest techniques for making the protection in an efficient way. The regular update is the essential part of every kind of security providers.The reliable transmission of information maximizes the data sharing process among home based users, small and medium level business, and a large scale business. A high level of protection increases the trust of clients and satisfaction of users and their organizations. References: Arana, P. (2006). Benefits and Vulnerabilities of Wi-Fi Protected Access 2 (WPA2). INFS 612 – Fall 2006. Berghel, H., and Uecker, J. (2004). Wireless infidelity II:airjacking. Com. ACM, 47(12): 15-20. Bellardo and Savage, S. (2003). 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In Proceedings of the USENIX Security Symposium 2003. Lashkari, A.H.,Mansoori . M., and Danesh, A.S. (2009). Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPAIEEE In 2009 International Conference on Signal Processing Systems, 15-17 May, 2009 on Singapore, IEEE, pp.445-449. MacMichael, J.L. (2005). Auditing Wi-Fi Protected Access (WPA) Pre-Shared Key Mode”; Linux Journal, 2005(137) p.2. Mathews, M., and Hunt, R. (2007). Evolution Of Wireless Lan Security Architecture To IEEE 802.11i (WPA2). Department of Computer Science and Software Engineering, University of Canterbury, New Zealand. Yasir, Z., and Yang. T. (2004). Wireless LAN security andlaboratory designs. J. Comput. Small Coll., 2004. 19(3), 44-60. Wi-Fi Alliance (2014). Wi-Fi Protected Access. Wi-Fi is everywhere. Avaiable from http://www.wi-fi.org/file/the-state-of-wi-fi-security-wi-fi-certified-wpa2-delivers- advanced-security-to-homes Accessed 07-11-2014. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Wi-Fi Protected Access Research Paper Example | Topics and Well Written Essays - 1000 words”, n.d.)
Wi-Fi Protected Access Research Paper Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1664385-wi-fi-protected-access
(Wi-Fi Protected Access Research Paper Example | Topics and Well Written Essays - 1000 Words)
Wi-Fi Protected Access Research Paper Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1664385-wi-fi-protected-access.
“Wi-Fi Protected Access Research Paper Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1664385-wi-fi-protected-access.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Wi-Fi Protected Access Work in LAN

An Assessment of the Vulnerabilities of the iPhone

“The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks.... An Assessment of the Vulnerabilities of the iPhone ... he various six steps in the vulnerability analysis help in the easy identification and the evaluation of the various vulnerabilities found in the various steps where the identification is necessary....
20 Pages (5000 words) Dissertation

The Future of Wi-Fi

This research paper "The Future of wi-fi" perfectly demonstrates that the vision of wi-fi blanketing entire cities in the United States has not been realized to the extent many people envisioned.... wi-fi faces challenges from evolving wireless technologies; however, with improved or new standards new frequencies will make wi-fi networks ever-more pervasive.... Many of the most immediate changes ahead for wi-fi are those that will strengthen wireless connectivity as an increasingly pervasive public service....
12 Pages (3000 words) Research Paper

The Advantages of Wireless Networking

The network was the first wireless lan (WLAN) comprising of five computers communicating in a bi-directional star topology.... Building a wireless network will require an access point, which receives and sends radio signals, as well as acting as a repeater.... An infrastructure wireless configuration constitutes more than one access point connections to an already existing single wireless network.... The term wireless network often refers to a wi-fi or 802....
4 Pages (1000 words) Research Paper

Wi-Fi Implementation in Hotels, Restaurants and Resorts

The paper "wi-fi Implementation in Hotels, Restaurants, and Resorts" tells us about information about wi-fi.... e take wi-fi on this case.... In 2007, the latest iteration of wi-fi-802.... A few years from now, a lot of businesses will be competitive....
36 Pages (9000 words) Assignment

Wi-Fi Implementation in Hospitality Industries

Wi-Fi, in general, is also termed as "wireless lan.... But it has wider scope and dimension than a lan.... For the hospitality industry, It is relatively easy to install a Wi-Fi network as compared to a wired lan as it requires minimum cabling.... The Initial investment for Wi-Fi can be higher than required for a wired lan but the overall installation and maintenance cost is lesser and under the Revenue Management scheme it fits quite well....
9 Pages (2250 words) Assignment

Wireless security

fter significant flaws were found in WEP another technology WPA - ( wi-fi protected access ) was introduced.... PA2™ (wi-fi protected access® 2) is even a more secure technology introduced after WPA which allows the network administrators the guarantee and assurance that network can only be accessed by such personnel who have special permission to access it.... It has reached a point where the user can communicate, connect and perform his desired action from anywhere employing the use of wireless technology for example wi-fi,Wi-Max etc. ...
2 Pages (500 words) Essay

Components of a Business System

easons for recommendation:lan is usually used for connecting computers of the same building or over a small area (geographically) and since Andrew is currently having four employees so lan is the best in the market for him.... The paper "Components of a Business System" highlights that the wrist can be avoided from having injury if the angle of the mouse, keyboard, and elbow is not properly aligned....
13 Pages (3250 words) Coursework

Wi-Fi Protected Setup Vulnerabilities

It would then be replaced by wi-fi protected access (WPA2) which just like WEP was developed to provide security for computer users operating through a private wireless network (Bosworth 2012, p.... This literature review "wi-fi protected Setup Vulnerabilities" looks at the WPS and how it is used to enhance the security of wireless connections.... The WPS was developed in 2006 by the wi-fi Alliance Company after it emerged that their earlier inventions had flaws in dealing with security concerns arising out of the wireless connection....
6 Pages (1500 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us