A Comparative Study of Security Protocols of Wireless Networks
The Wireless Network has become essential and integral part of
our lives. It is being used at extensive level in present scenario
and increasing with great speed. Because of its nature and
characteristics the wireless networks is more vulnerable in
terms of information security. The information in wireless
networks is present ubiquitously with lesser security platform. In our previous article we focused the main and important
security threats on wireless networks which were termed as
CIAAS Pentagon, where CIAAS is expanded as
Confidentiality, Integrity, Authentication, Availability, and
Secrecy, which was driven from CIA Triad, stands for
Confidentiality, Integrity, and Availability.
In this article we are broadening the horizon of various
important security protocols for Wireless Networks. These
protocols are studied and analyzed with their working and
functionality, importance, and demerits. Finally these security
protocols are compared with each other based on some
important parameters.
Keywords: Wireless Networks, Security Protocols, CIA Triad,WEP, WPA, WPA2, CIAAS Pentagon, Confidentiality,Authentication, Integrity, Secrecy, Availability, IntegrityThreats, Integrity Preventions
Download Full-Text
ABOUT THE AUTHORS
Kumar Pal Singh
Dept. of IT, Institute of Technology and Science, Ghaziabad
Gaurav Kumar
Dept. of IT, Institute of Technology and Science, Ghaziabad
Abhay N Tripathi
Dept. of IT, Institute of Technology and Science, Ghaziabad
Kumar Pal Singh
Dept. of IT, Institute of Technology and Science, Ghaziabad
Gaurav Kumar
Dept. of IT, Institute of Technology and Science, Ghaziabad
Abhay N Tripathi
Dept. of IT, Institute of Technology and Science, Ghaziabad