Skip to main content

Performance Evaluation and Analysis of Wi-Fi Security Protocols

  • Conference paper
  • First Online:
Intelligent Sustainable Systems

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 578))

  • 645 Accesses

Abstract

In the twenty-first century as the technology evolves in a rapid pace, more and more number of users and businesses are getting connected to the Internet. A vast majority of these users use the wireless mode (Wi-Fi) for getting connected to the Internet. As the number of users and the online transactions rises in billions so is the risk of a cyber-fraud, due to the vulnerabilities present in the Wi-Fi protocols (WEP, WPA and WPA2). Security remains a huge challenge as Wi-Fi passwords could be cracked from both home and enterprise-level networks by using the tools and by performing social engineering attacks. Data protection is a huge challenge for computer scientists, and in this work, the investigators have identified the loopholes of Wi-Fi encryption protocols. The identification procedures are tested on a test network with various Wi-Fi encryption protocols in a controlled laboratory setup. Data packets from the wireless networks could be easily sniffed by using aircrack-ng software suite for capturing the handshake and ultimately for cracking the password from huge wordlists. The process of cracking the password could also be speed up by using a Graphics Processing Unit (GPU) which performs set of repetitive tasks in a faster way and helps in extracting passwords. The overall investigation helps investigators to understand the vulnerabilities present in the modern-day Wi-Fi protocols. Hence, it has been proposed the use of RADIUS server model like in an enterprise network and the use of Wi-Max standard of security for better safety measures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Moissinac, K., Ramos, D., Rendon, G., Elleithy, A.: Wireless encryption and WPA2 weaknesses. In: 2021 IEEE 11th Annual computing and communication workshop and conference (CCWC) (2021)

    Google Scholar 

  2. Malgaonkar, S., Patil, R., Rai, A., Singh, A.: Research on WiFi security protocols, Int. J. Comput. Appl. (0975–8887), 164(3) (2017)

    Google Scholar 

  3. Yadav, J., Verma, M.: Comparative analysis: Wi-Fi security protocols. Int. J. Eng. Res. Technol. (IJERT), 2(12) (2013)

    Google Scholar 

  4. Khasawneh, M., Kajman, I., Alkhudaidy, R., Althubyani, A.: A survey on Wi-Fi protocols: WPA and WPA2. In: SNDS 2014, CCIS 420, pp. 496–511. © Springer, Berlin, Heidelberg (2014)

    Google Scholar 

  5. https://www.techtarget.com/searchsecurity/definition/encryption

  6. https://www.securew2.com/blog/complete-guide-wi-fi-security

  7. https://www.avast.com/c-wep-vs-wpa-orwpa2#:~:text=easily%20exploitable%20elements,What%20is%20WPA2%3F,and%20protect%20Wi%2DFi%20networks

  8. https://www.actcorp.in/blog/wep-wpa-wpa2-wifi-security

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saptorshi Bhattacharjee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bhattacharjee, S., Senapati, K.K. (2023). Performance Evaluation and Analysis of Wi-Fi Security Protocols. In: Nagar, A.K., Singh Jat, D., Mishra, D.K., Joshi, A. (eds) Intelligent Sustainable Systems. Lecture Notes in Networks and Systems, vol 578. Springer, Singapore. https://doi.org/10.1007/978-981-19-7660-5_29

Download citation

Publish with us

Policies and ethics