Friday 19th of April 2024
 

A Comparative Study of Security Protocols of Wireless Networks


Kumar Pal Singh, Gaurav Kumar and Abhay N Tripathi

The Wireless Network has become essential and integral part of our lives. It is being used at extensive level in present scenario and increasing with great speed. Because of its nature and characteristics the wireless networks is more vulnerable in terms of information security. The information in wireless networks is present ubiquitously with lesser security platform. In our previous article we focused the main and important security threats on wireless networks which were termed as CIAAS Pentagon, where CIAAS is expanded as Confidentiality, Integrity, Authentication, Availability, and Secrecy, which was driven from CIA Triad, stands for Confidentiality, Integrity, and Availability. In this article we are broadening the horizon of various important security protocols for Wireless Networks. These protocols are studied and analyzed with their working and functionality, importance, and demerits. Finally these security protocols are compared with each other based on some important parameters.

Keywords: Wireless Networks, Security Protocols, CIA Triad,WEP, WPA, WPA2, CIAAS Pentagon, Confidentiality,Authentication, Integrity, Secrecy, Availability, IntegrityThreats, Integrity Preventions

Download Full-Text


ABOUT THE AUTHORS

Kumar Pal Singh
Dept. of IT, Institute of Technology and Science, Ghaziabad

Gaurav Kumar
Dept. of IT, Institute of Technology and Science, Ghaziabad

Abhay N Tripathi
Dept. of IT, Institute of Technology and Science, Ghaziabad


IJCSI Published Papers Indexed By:

 

 

 

 
+++
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »