A Survey on the Security Benefits and Threats of WPA
VerifiedAdded on 2022/10/16
|8
|5568
|59
AI Summary
This research paper explores and analyzes the security benefits and threats associated with WPA revisions on its strength and weaknesses. It covers the security features, benefits, and security threats of WPA, WPA 2, and WPA 3 protocols. The paper also includes research methods used to analyze the security issues linked with WPA networks.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
RESEARCH PAPER 1
Abstract-WPA refers to the Wi-Fi protected access which
is used for protecting data, mobile devices and computing
networks from the unauthentic access. It is one of the
common types of the protocol which is used in the wireless
networks for performing communication activities. The
main objective of this paper is to explore and analyze WPA
revisions on its strength and weaknesses. There are major
three variants involved in this network protocol for
example mainly WPA, WPA 2 and WPA 3 which are
discussed in this research. There are major three sections
explored in this investigation, for example, security
features of WPA, benefits and security threats associated
with the WPA protocols. The researcher included numerous
research methods including qualitative design, inductive
approach, and secondary kind of data gathering technique
and so on. The author shows the benefits and features of the
WPA, WPA 2 and WPA 3 protocols and also highlighted
their advancement over the WEP networks. In the case of
WPA 3, the developers involved SAE instead of TKIP that
reduced security errors and risks. Therefore, it is identified
that WPA 3 is more secure and reliable protocol rather than
other and it can be used in the wireless networks for
exchanging data over a network.
Keywords: WPA, WEP, WPA 2, WPA 3 and SAE
INTRODUCTION
The term WPA is defined as Wi-Fi protected Access
which is a part of the security system used by the
consumers for controlling and managing the privacy
of data. Mainly, WPA was developed and
implemented by the Wi-Fi alliance to deliver more
effective encryption process and authentication
access to the consumers. It is identified that there are
major three variations of WPA system are used by
the companies in their computing networks, for
example, mainly WPA, WPA II, and WPA III that
was developed in the year 2018 [1]. The key
objective of the proposed research is to examine the
security benefits and threats associated with the WPA
technique and evaluate their different variations used
in the companies. It is very important for the users to
understand and evaluate the benefits and risks factors
linked with the Wi-Fi protection access while using
computing networks in the IT system. There are
various sections will be included in this investigation,
for example, security features of WPA, benefits of
WPA and security threats of WPA [2].
BACKGROUND
WPA is a part of the security protocol and privacy
certification program which is developed by the Wi-
Fi alliance for securing the wireless computer
networks. WPA has the potential to control and
manage security risks and threats linked with the
computer networks and it is a more effective process
rather than WEP technique. It is identified that WPA
is a more secure system that has the potential to
handle unauthentic access from the server and
provide a way where users can effectively utilize
computer networks [3]. The major focus of this
proposed research is to identify the strengths and
weakness of the WPA system and analyze different
variations developed in the last few years. It is very
important for companies to increase the security of
the computing networks because hackers are able to
block communication channels and reduce the
privacy of data but WPA is a reliable process that
may increase authorized access of the networks. It
has found that there are major three variations of the
WPA security system which are described below:
WPA
WPA II
WPA III
WPA
WPA is one of the oldest security protocols that was
developed in the year 2003 and reduced the
drawbacks or limitations of the wired equivalent
privacy system. It is identified that WPA has discrete
modes for the consumers and it is more effective and
reliable rather than WEP system due to which
numbers of users are using this protocol for securing
computer networks and devices [4].
SECURITY FEATURES OF WPA
It is identified that WPA protocol is mainly designed
and implemented for securing wireless networks and
devices and reducing the issue of unauthentic access
from the system. The security features of the WPA
are more similar to the WEP protocol but it offers an
effective way to handles security issues and threats in
the system. In terms of authentication, the WPA
provides more effective encryption protocols that can
help the users for controlling and reducing the traffic
signals from the system. A recent study identified
that there are major two kinds of encryption protocols
A Survey on the security benefits and
threats of WPA
Abstract-WPA refers to the Wi-Fi protected access which
is used for protecting data, mobile devices and computing
networks from the unauthentic access. It is one of the
common types of the protocol which is used in the wireless
networks for performing communication activities. The
main objective of this paper is to explore and analyze WPA
revisions on its strength and weaknesses. There are major
three variants involved in this network protocol for
example mainly WPA, WPA 2 and WPA 3 which are
discussed in this research. There are major three sections
explored in this investigation, for example, security
features of WPA, benefits and security threats associated
with the WPA protocols. The researcher included numerous
research methods including qualitative design, inductive
approach, and secondary kind of data gathering technique
and so on. The author shows the benefits and features of the
WPA, WPA 2 and WPA 3 protocols and also highlighted
their advancement over the WEP networks. In the case of
WPA 3, the developers involved SAE instead of TKIP that
reduced security errors and risks. Therefore, it is identified
that WPA 3 is more secure and reliable protocol rather than
other and it can be used in the wireless networks for
exchanging data over a network.
Keywords: WPA, WEP, WPA 2, WPA 3 and SAE
INTRODUCTION
The term WPA is defined as Wi-Fi protected Access
which is a part of the security system used by the
consumers for controlling and managing the privacy
of data. Mainly, WPA was developed and
implemented by the Wi-Fi alliance to deliver more
effective encryption process and authentication
access to the consumers. It is identified that there are
major three variations of WPA system are used by
the companies in their computing networks, for
example, mainly WPA, WPA II, and WPA III that
was developed in the year 2018 [1]. The key
objective of the proposed research is to examine the
security benefits and threats associated with the WPA
technique and evaluate their different variations used
in the companies. It is very important for the users to
understand and evaluate the benefits and risks factors
linked with the Wi-Fi protection access while using
computing networks in the IT system. There are
various sections will be included in this investigation,
for example, security features of WPA, benefits of
WPA and security threats of WPA [2].
BACKGROUND
WPA is a part of the security protocol and privacy
certification program which is developed by the Wi-
Fi alliance for securing the wireless computer
networks. WPA has the potential to control and
manage security risks and threats linked with the
computer networks and it is a more effective process
rather than WEP technique. It is identified that WPA
is a more secure system that has the potential to
handle unauthentic access from the server and
provide a way where users can effectively utilize
computer networks [3]. The major focus of this
proposed research is to identify the strengths and
weakness of the WPA system and analyze different
variations developed in the last few years. It is very
important for companies to increase the security of
the computing networks because hackers are able to
block communication channels and reduce the
privacy of data but WPA is a reliable process that
may increase authorized access of the networks. It
has found that there are major three variations of the
WPA security system which are described below:
WPA
WPA II
WPA III
WPA
WPA is one of the oldest security protocols that was
developed in the year 2003 and reduced the
drawbacks or limitations of the wired equivalent
privacy system. It is identified that WPA has discrete
modes for the consumers and it is more effective and
reliable rather than WEP system due to which
numbers of users are using this protocol for securing
computer networks and devices [4].
SECURITY FEATURES OF WPA
It is identified that WPA protocol is mainly designed
and implemented for securing wireless networks and
devices and reducing the issue of unauthentic access
from the system. The security features of the WPA
are more similar to the WEP protocol but it offers an
effective way to handles security issues and threats in
the system. In terms of authentication, the WPA
provides more effective encryption protocols that can
help the users for controlling and reducing the traffic
signals from the system. A recent study identified
that there are major two kinds of encryption protocols
A Survey on the security benefits and
threats of WPA
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
RESEARCH PAPER 2
used in the WPA system, for example, temporal key
integrity and advanced encryption standard.
Moreover, such kind of security network also
involves authentication key distribution along with
the built-in authentication system that did not involve
in the WEP system. It is very complex for consumers
to identify the unauthentic servers from the system
but WPA provided a platform where users can
enhance the security of authorized networks and
maintain security related issues [5]. According to .,
Bai, WANG and, Xue, (2012) WPA protocol support
RADIUS servers and networks and when a computer
system connects to a WPA network, authentication
keys are produced using four-way handshake systems
that use RADIUS servers. Moreover, it uses WPA
pre-shared key while transferring data from one
network to another because of these features the
security of networks and servers may be increased
effectively.
BENEFITS OF WPA
WPA protocol is mainly developed and implemented
for reducing security risks related to wireless
networks and devices. It is an advanced version of
the WEP protocol that has the potential to control
unauthentic servers from the system and also reduced
drawbacks of WEP system. In the case of WPA, the
encryption key is changed after each frame with the
help of TKIP which is another benefit of this system.
Moreover, there are several benefits of the WPA
protocol for example, more effective, reduce errors
occurred in the WEP, helped users for securing
computer networks and allows secret encryption keys
that cannot be hacked by the criminals. As compared
with the WEP networks, WPA provided better key
management and excellent message checking process
that improves the overall performance of the
computing networks. A recent study identified that
WEP protocols use data link and physical layers of
the OSI model that does not provide end to end
security this issue may be solved with the help of
WPA protocols and users may enhance the security
of their sensitive data.
SECURITY THREATS OF WPA
It is observed that WPA is an effective security
protocol that has the capability to address security
risks and threats linked with computer networks.
WEP is not much secure due to which it cannot be
used in the IT systems and servers because it does not
provide a secure encryption technique by which
hackers can enter into the system effectively. There
are numerous kinds of security threats and risks
occurred in the wireless networks, for example,
unauthentic access, traffic signals and unwanted
servers, malware attacks, DDOS attack, rouge to
access and so on. In which authentication access and
other security risks can be addressed with the help of
WPA protocol but it is not able to reduce malware
and DDOS attacks which are major limitations of this
network. Therefore, it is stated that the WPA system
can be used by the users rather than WEP but it is
very important to focus on the privacy of data.
WPA 2
It is an advanced version of the WPA protocol which
is developed and implemented in the year 2004 for
reducing the drawbacks of the old WPA networks
and servers. The aim of the WPA II protocol is to
improve the overall performance of computer
networks and devices by reducing security threats
and attacks.
SECURITY FEATURES OF WPA 2
The security feature of the WPA protocol is mainly
based on the 802.11i IEEE standard which included
the features of advanced encryption standard for
reducing the limitations of WPA systems. It is
identified that AES is an effective system that has the
potential to provide secure authentication keys to the
consumers and provide enough security to computer
networks. Kumkar, et al., (2012) identified that the
WPA 2 uses the counter mode cipher technique that
did not include in the WPA and it also included
message authentication system that has the potential
to improve the authenticity of the user's data. As
compared with the TKIP protocol advanced
encryption standard is more effective and reliable
which is used in the WPA 2 protocol along with the
authentication protocol extensions. Therefore, it is
stated that the WPA 2 is more effective and reliable
rather than WPA and also reduced the limitations of
the WPA protocol.
BENEFITS OF WPA 2
It is identified that WPA 2 is an effective network
protocol that changed the way of communication and
provided a secured platform where users may
perform data communication processes. In the case of
WPA 2 protocol, the separation of consumer
authentication may be performed which is a major
advantage of this system over the oldest WPA
system. However, WPA 2 is more suitable and
reliable for the home networks because of their
ability to reduce traffic signals from the networks. It
is identified that WPA 2 addressed the attacks and
vulnerabilities of WEP networks by using AES type
of authentication system and also increased the
performance of wireless networks used in the
companies [7]. Such kind of communication protocol
does not require re-authenticate system because it
allows consumers to automatically connect with the
used in the WPA system, for example, temporal key
integrity and advanced encryption standard.
Moreover, such kind of security network also
involves authentication key distribution along with
the built-in authentication system that did not involve
in the WEP system. It is very complex for consumers
to identify the unauthentic servers from the system
but WPA provided a platform where users can
enhance the security of authorized networks and
maintain security related issues [5]. According to .,
Bai, WANG and, Xue, (2012) WPA protocol support
RADIUS servers and networks and when a computer
system connects to a WPA network, authentication
keys are produced using four-way handshake systems
that use RADIUS servers. Moreover, it uses WPA
pre-shared key while transferring data from one
network to another because of these features the
security of networks and servers may be increased
effectively.
BENEFITS OF WPA
WPA protocol is mainly developed and implemented
for reducing security risks related to wireless
networks and devices. It is an advanced version of
the WEP protocol that has the potential to control
unauthentic servers from the system and also reduced
drawbacks of WEP system. In the case of WPA, the
encryption key is changed after each frame with the
help of TKIP which is another benefit of this system.
Moreover, there are several benefits of the WPA
protocol for example, more effective, reduce errors
occurred in the WEP, helped users for securing
computer networks and allows secret encryption keys
that cannot be hacked by the criminals. As compared
with the WEP networks, WPA provided better key
management and excellent message checking process
that improves the overall performance of the
computing networks. A recent study identified that
WEP protocols use data link and physical layers of
the OSI model that does not provide end to end
security this issue may be solved with the help of
WPA protocols and users may enhance the security
of their sensitive data.
SECURITY THREATS OF WPA
It is observed that WPA is an effective security
protocol that has the capability to address security
risks and threats linked with computer networks.
WEP is not much secure due to which it cannot be
used in the IT systems and servers because it does not
provide a secure encryption technique by which
hackers can enter into the system effectively. There
are numerous kinds of security threats and risks
occurred in the wireless networks, for example,
unauthentic access, traffic signals and unwanted
servers, malware attacks, DDOS attack, rouge to
access and so on. In which authentication access and
other security risks can be addressed with the help of
WPA protocol but it is not able to reduce malware
and DDOS attacks which are major limitations of this
network. Therefore, it is stated that the WPA system
can be used by the users rather than WEP but it is
very important to focus on the privacy of data.
WPA 2
It is an advanced version of the WPA protocol which
is developed and implemented in the year 2004 for
reducing the drawbacks of the old WPA networks
and servers. The aim of the WPA II protocol is to
improve the overall performance of computer
networks and devices by reducing security threats
and attacks.
SECURITY FEATURES OF WPA 2
The security feature of the WPA protocol is mainly
based on the 802.11i IEEE standard which included
the features of advanced encryption standard for
reducing the limitations of WPA systems. It is
identified that AES is an effective system that has the
potential to provide secure authentication keys to the
consumers and provide enough security to computer
networks. Kumkar, et al., (2012) identified that the
WPA 2 uses the counter mode cipher technique that
did not include in the WPA and it also included
message authentication system that has the potential
to improve the authenticity of the user's data. As
compared with the TKIP protocol advanced
encryption standard is more effective and reliable
which is used in the WPA 2 protocol along with the
authentication protocol extensions. Therefore, it is
stated that the WPA 2 is more effective and reliable
rather than WPA and also reduced the limitations of
the WPA protocol.
BENEFITS OF WPA 2
It is identified that WPA 2 is an effective network
protocol that changed the way of communication and
provided a secured platform where users may
perform data communication processes. In the case of
WPA 2 protocol, the separation of consumer
authentication may be performed which is a major
advantage of this system over the oldest WPA
system. However, WPA 2 is more suitable and
reliable for the home networks because of their
ability to reduce traffic signals from the networks. It
is identified that WPA 2 addressed the attacks and
vulnerabilities of WEP networks by using AES type
of authentication system and also increased the
performance of wireless networks used in the
companies [7]. Such kind of communication protocol
does not require re-authenticate system because it
allows consumers to automatically connect with the
RESEARCH PAPER 3
server by performing advanced encryption
algorithms. However, it improved the effectiveness
of the wireless networks and servers over the past
WPA and WEP due to which most of the companies
are using the key aspects of WPA 2 protocols for
improving the privacy of wireless networks and
servers [8].
SECURITY THREATS OF WPA II
It is identified that the concept behind WPA 2 is
similar to the WPA but it improved the encryption
process used in the WPA that helped the users for
addressing security issues. It is argued that WPA 2
type of wireless protocol addressed vulnerabilities
and threats associated with the WEP protocols
including, MITM attack, unauthentic access, brute
force issue and so on. Unfortunately, the issue of
security attacks occurred in the Wi-Fi protected setup
is still high in the case of WPA 2 protocols that
occurred in the WPA. The issue of a malware attack
is not still addressed in the current WPA 2 due to
which the users may suffer from the data breach
issues and hacking.
WPA 3
It is the latest version of Wi-Fi protected access that
was developed and released in the year 2018 and
many companies are using this protocol in their
computer networks because of their higher reliability.
It is mainly implemented for resolving the issues
associated with the WPA 2 protocols and reduce the
security concerns faced by the users while using
wireless networks.
SECURITY FEATURES OF WPA 3
It is observed that there are major four features
included in WPA 3 for improving the performance of
wireless networks. These features include privacy on
the public networks, protections data against security
attacks, easily connecting with the computer
networks and providing larger security to the
government communities [9]. A recent investigation
identified that the developers changed the
infrastructures of security in the WPA 3 and included
the features of simultaneous authentication of equals
for improving the privacy of data.
By using the concept of SAE technique the
developers are able to improve authentication access
of the networks and helped the users for securing
their private data and information. In the case of
WPA 3 protocol opportunistic wireless encryption,
the technique is used for providing authentication
keys to the users. Such kind of process uses protected
management system in order to secure the
management traffic between the computing networks
and access points.
BENEFITS OF WPA 3
It is identified that the security of data is a major
advantage of this WPA 3 network protocol due to
which numbers of users are connected with the
networks over Wi-Fi servers. A recent study argued
that there are major three benefits of the WPA 3 over
the WEP and other variations of WPA protocols
which are described below:
In-transit security: the advanced WPA 3 protocols
128-bit encryption by the 192-bit encryption due to
which users can effectively exchange data over a
wireless network. With the help of a larger rate of bit-
encryption the issues associated with the wireless
networks may be addressed [10].
Secure authentication: As compared with the other
computer protocols WPA 3 included a new security
level called simultaneous authentication of equals
that has the ability to monitor authentication access
effectively. Moreover, it also uses the concept of
forward secrecy that protects the communication
channels and networks used by the consumers for
sending and receiving data.
Public network security: The major advantage of
the WPA 3 protocol is that it increased the security of
public networks that were the major issues linked
with the WEP and WPA 2. Therefore, with the help
of WPA 3 consumers and other third party servers
can enhance the security of private details along with
the privacy of computer networks.
SECURITY THREATS OF WPA 3
It is identified that security of Data is a major
concern associated with the wireless networks and it
can be handled with the help of WPA 3 protocols.
Therefore, it is stated that by using WPA 3 protocols
the data breach and other cybersecurity threats may
be solved but lack of privacy is the biggest issue that
may help hackers for performing malicious activities
[11].
RESEARCH METHODS
This part of the thesis proposition consolidates
diverse research approaches and methods like
research plan, ways of thinking, information
gathering procedure, and methodologies. It is
successful to get solid information and understanding
the examination issues. The point of this segment is
to build learning about the effect of authority style on
worker's fulfilment. There is an alternate article
server by performing advanced encryption
algorithms. However, it improved the effectiveness
of the wireless networks and servers over the past
WPA and WEP due to which most of the companies
are using the key aspects of WPA 2 protocols for
improving the privacy of wireless networks and
servers [8].
SECURITY THREATS OF WPA II
It is identified that the concept behind WPA 2 is
similar to the WPA but it improved the encryption
process used in the WPA that helped the users for
addressing security issues. It is argued that WPA 2
type of wireless protocol addressed vulnerabilities
and threats associated with the WEP protocols
including, MITM attack, unauthentic access, brute
force issue and so on. Unfortunately, the issue of
security attacks occurred in the Wi-Fi protected setup
is still high in the case of WPA 2 protocols that
occurred in the WPA. The issue of a malware attack
is not still addressed in the current WPA 2 due to
which the users may suffer from the data breach
issues and hacking.
WPA 3
It is the latest version of Wi-Fi protected access that
was developed and released in the year 2018 and
many companies are using this protocol in their
computer networks because of their higher reliability.
It is mainly implemented for resolving the issues
associated with the WPA 2 protocols and reduce the
security concerns faced by the users while using
wireless networks.
SECURITY FEATURES OF WPA 3
It is observed that there are major four features
included in WPA 3 for improving the performance of
wireless networks. These features include privacy on
the public networks, protections data against security
attacks, easily connecting with the computer
networks and providing larger security to the
government communities [9]. A recent investigation
identified that the developers changed the
infrastructures of security in the WPA 3 and included
the features of simultaneous authentication of equals
for improving the privacy of data.
By using the concept of SAE technique the
developers are able to improve authentication access
of the networks and helped the users for securing
their private data and information. In the case of
WPA 3 protocol opportunistic wireless encryption,
the technique is used for providing authentication
keys to the users. Such kind of process uses protected
management system in order to secure the
management traffic between the computing networks
and access points.
BENEFITS OF WPA 3
It is identified that the security of data is a major
advantage of this WPA 3 network protocol due to
which numbers of users are connected with the
networks over Wi-Fi servers. A recent study argued
that there are major three benefits of the WPA 3 over
the WEP and other variations of WPA protocols
which are described below:
In-transit security: the advanced WPA 3 protocols
128-bit encryption by the 192-bit encryption due to
which users can effectively exchange data over a
wireless network. With the help of a larger rate of bit-
encryption the issues associated with the wireless
networks may be addressed [10].
Secure authentication: As compared with the other
computer protocols WPA 3 included a new security
level called simultaneous authentication of equals
that has the ability to monitor authentication access
effectively. Moreover, it also uses the concept of
forward secrecy that protects the communication
channels and networks used by the consumers for
sending and receiving data.
Public network security: The major advantage of
the WPA 3 protocol is that it increased the security of
public networks that were the major issues linked
with the WEP and WPA 2. Therefore, with the help
of WPA 3 consumers and other third party servers
can enhance the security of private details along with
the privacy of computer networks.
SECURITY THREATS OF WPA 3
It is identified that security of Data is a major
concern associated with the wireless networks and it
can be handled with the help of WPA 3 protocols.
Therefore, it is stated that by using WPA 3 protocols
the data breach and other cybersecurity threats may
be solved but lack of privacy is the biggest issue that
may help hackers for performing malicious activities
[11].
RESEARCH METHODS
This part of the thesis proposition consolidates
diverse research approaches and methods like
research plan, ways of thinking, information
gathering procedure, and methodologies. It is
successful to get solid information and understanding
the examination issues. The point of this segment is
to build learning about the effect of authority style on
worker's fulfilment. There is an alternate article
RESEARCH PAPER 4
which is considered in the exploration to make
harmony in the midst of the point and related data.
The noticeable procedures of research additionally
improve the examination quality and its validity by
utilizing diverse proof with respect to the research
issue. With the help of research methods, the security
issues linked with the WPA networks are analyzed
and evaluated in an effective manner. There are many
research techniques used in this paper including
research design, research approach, data gathering
process, and data analysis method.
RESEARCH APPROACH
It is a basic piece of research method as it decides the
reason for choosing the specific method of research.
The exploration approach is arranged into various
parts like inductive and deductive methodology. The
inductive methodology is actualized to evaluate the
profundity perception of raw numbers and
furthermore made hypothetical viewpoints with
respect to the research issue. As opposed to this, a
deductive methodology is executed to develop
speculation.
Therefore, in this paper, an inductive type of research
approach is used because of the theoretical nature of
the investigation that provided a way for developing
and implementing effective arguments in the
research. This methodology is utilized in this paper
because of its significance with interpretivism inquire
about the way of thinking. There is no compelling
reason to build the speculation consequently
inductive methodology is utilized that aided for
building up the dependable research questions.
Therefore, the selected research approach controlled
and manage the gaps associated with the research and
identified the research concerns that affected the
quality of the research.
RESEARCH DESIGN
It is a more effective section of the research
technique which is powerful to layout the exploration
structure. By utilizing the exploration plan, an
examination can get right heading to grasp the
examination issue to get helpful and proper
information.
It likewise helped the scientist to design about the
technique of research think about and empowers
them to make answer the few inquiries regarding
exploration work. There are various types of research
plan which could be utilized in research, for example,
quantitative and subjective research structure.
Quantitative research configuration focuses on the
numerical data. Moreover, subjective research
configuration empowers the specialist to make a
sentiment and builds speculation. It additionally gives
the base to quantitative research. It encourages the
analyst to get profundity data with respect to the
research issue. In this investigation, the subjective or
qualitative research design is used that has the
potential to maintain the gaps between the research
and information and also provided all relevant facts
about the WPA networks and its security issues.
Therefore, the selected research design helped the
researcher for obtaining reliable information and
achieving aims of the investigation with the selected
time period.
RESEARCH STRATEGY
The exploration technique is helpful for an
examination to survey the information gathering
ways by which research would be directed in a
powerful manner. There is sure research technique
which enables the scientist to lead practical and
substantial research result. These systems could be
study, centre gathering, writing audit, etc. In this
research paper, a literature review is conducted that
provided secondary data about the research and also
included the viewpoints of the other experts in order
to enhance the quality of the research. Moreover, for
obtaining theoretical aspects about the WPA
networks and security issues numerous resources are
used, for example, journal papers, peer-reviewed
articles, offline sources, books and other resources.
Therefore, the selected research strategies helped for
finding the reliable facts and reduced errors faced by
the author while conducting the research.
DATA COLLECTION METHOD
Information gathering strategy is critical to achieve
the point and destinations of research as this method
empowers a scientist to pool the information
effectively. There are major two information-
gathering systems could be actualized by a scientist
like essential and secondary information. In this
paper, a secondary data gathering method is adopted
because of their ability to provide reliable and
appropriate info about the research concern.
Moreover, the secondary data related to the WPA
networks are collected from different sources, for
example, journal papers, online sites, offline books
and so on. A literature review is also conducted for
obtaining the viewpoints of the researchers and
analyzing the findings of the previous papers.
Therefore, the selected data gathering technique
supported the author for finding and obtaining
effective information related to the WPA networks
and improved the quality of the research.
which is considered in the exploration to make
harmony in the midst of the point and related data.
The noticeable procedures of research additionally
improve the examination quality and its validity by
utilizing diverse proof with respect to the research
issue. With the help of research methods, the security
issues linked with the WPA networks are analyzed
and evaluated in an effective manner. There are many
research techniques used in this paper including
research design, research approach, data gathering
process, and data analysis method.
RESEARCH APPROACH
It is a basic piece of research method as it decides the
reason for choosing the specific method of research.
The exploration approach is arranged into various
parts like inductive and deductive methodology. The
inductive methodology is actualized to evaluate the
profundity perception of raw numbers and
furthermore made hypothetical viewpoints with
respect to the research issue. As opposed to this, a
deductive methodology is executed to develop
speculation.
Therefore, in this paper, an inductive type of research
approach is used because of the theoretical nature of
the investigation that provided a way for developing
and implementing effective arguments in the
research. This methodology is utilized in this paper
because of its significance with interpretivism inquire
about the way of thinking. There is no compelling
reason to build the speculation consequently
inductive methodology is utilized that aided for
building up the dependable research questions.
Therefore, the selected research approach controlled
and manage the gaps associated with the research and
identified the research concerns that affected the
quality of the research.
RESEARCH DESIGN
It is a more effective section of the research
technique which is powerful to layout the exploration
structure. By utilizing the exploration plan, an
examination can get right heading to grasp the
examination issue to get helpful and proper
information.
It likewise helped the scientist to design about the
technique of research think about and empowers
them to make answer the few inquiries regarding
exploration work. There are various types of research
plan which could be utilized in research, for example,
quantitative and subjective research structure.
Quantitative research configuration focuses on the
numerical data. Moreover, subjective research
configuration empowers the specialist to make a
sentiment and builds speculation. It additionally gives
the base to quantitative research. It encourages the
analyst to get profundity data with respect to the
research issue. In this investigation, the subjective or
qualitative research design is used that has the
potential to maintain the gaps between the research
and information and also provided all relevant facts
about the WPA networks and its security issues.
Therefore, the selected research design helped the
researcher for obtaining reliable information and
achieving aims of the investigation with the selected
time period.
RESEARCH STRATEGY
The exploration technique is helpful for an
examination to survey the information gathering
ways by which research would be directed in a
powerful manner. There is sure research technique
which enables the scientist to lead practical and
substantial research result. These systems could be
study, centre gathering, writing audit, etc. In this
research paper, a literature review is conducted that
provided secondary data about the research and also
included the viewpoints of the other experts in order
to enhance the quality of the research. Moreover, for
obtaining theoretical aspects about the WPA
networks and security issues numerous resources are
used, for example, journal papers, peer-reviewed
articles, offline sources, books and other resources.
Therefore, the selected research strategies helped for
finding the reliable facts and reduced errors faced by
the author while conducting the research.
DATA COLLECTION METHOD
Information gathering strategy is critical to achieve
the point and destinations of research as this method
empowers a scientist to pool the information
effectively. There are major two information-
gathering systems could be actualized by a scientist
like essential and secondary information. In this
paper, a secondary data gathering method is adopted
because of their ability to provide reliable and
appropriate info about the research concern.
Moreover, the secondary data related to the WPA
networks are collected from different sources, for
example, journal papers, online sites, offline books
and so on. A literature review is also conducted for
obtaining the viewpoints of the researchers and
analyzing the findings of the previous papers.
Therefore, the selected data gathering technique
supported the author for finding and obtaining
effective information related to the WPA networks
and improved the quality of the research.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
RESEARCH PAPER 5
DATA ANALYSIS
It is a critical piece of research technique as it gives a
reliable and exact outcome. Further, a few strategies
could be executed to break down information like
Excel, content investigation, and SPSS. There are
various methodologies of information investigation
include in the research such as inferential, descriptive
content, statistical and measurable. For this thesis, the
descriptive content examination is utilized by a
specialist to decipher the gathered information.
Moreover, Ms-exceed expectation programming is
utilized to display the data through various pie
outlines, charts, and bar graph. It helped in obtaining
the aims and goals of the research and analyzing the
collected data from the literature review.
RESULTS
From the above discussion, it has found that WPA is
more secure and effective protocol rather than WEP
due to which it can be used for wireless networks and
systems. There are major two points associated with
the WPA including the privacy of data and
performance of computing networks. It is observed
that the WAP 3 is an advanced network protocol that
has the potential to control and evaluate the private
and public networks effectively [15]. The proposed
research provided a way where the students can
understand the benefits and threats associated with
the WPA protocols. A recent study identified that
security is a common issue that impacts on the
performance of wireless networks and WEP is not
much secure due to which users may suffer from the
data privacy issues [12]. In order to control and
reduce drawbacks of the WEP protocols, WPA
networks were implemented that has the capability to
improve the overall effectiveness of the computing
networks and servers.
From the above evaluation, it has found that the
WPA protocol uses the concept of TKIP system
along with the security encryption technique for
improving the privacy of the communication
channels used in the computer devices. The major
problem linked with the WPA 2 network is that it is
not able to control and avoid security threats linked
with the WPA and WEP networks. It is stated that
WPA 3 is a more secure and appropriate protocol that
included the features of SAE network and also
developed an advanced encryption process for
providing secured authentic keys to the users [14].
The selected research methodologies help for finding
and evaluating the reliable information about the
WPA networks and also reduced gaps occurred in the
research [13]. However, still, it is very complex for
consumers to handle security attacks and threats from
the wireless networks including DDOS attack,
malware attack, ransomware, and so on. The previous
papers focused on the security issues linked with the
wireless networks and WPA protocols but the current
investigation enabled the students for understanding
security features and advantages of WPA and other
variants of the WPA protocols. Therefore, it is
suggested that users should ensure that wireless
networks are connected with secured WPA protocols
and servers.
CONCLUSION
From the above investigation, it is concluded that
WPA 3 is more advanced and secured protocol rather
than WEP and WPA 2 because it uses the concept of
SAE along with the AES authentic system. The
proposed research identified the advantages and
limitations of each WPA system and also compared
with the WEP protocols. From this investigation, it is
identified that WPA 3 changed the way of
communication that also addressed the issues
associated with the WEP and provided security to the
public computer networks. The major drawback of
the WPA2 is that it cannot be used for securing the
large computing networks and public servers and it
may be resolved with the help of WPA 3 protocol.
WPA 2 still did not resolve the security threats
associated with the WPA but handled numbers of
vulnerabilities occurred in the WEP including MITM
attack, and so on. It is stated that the findings of the
proposed study appropriately impact on the selected
topic and the students will be able to enhance their
skills in the area of WPA protocols along with the
security threats.
REFERENCES
[1]. S., Bai, Y.J. WANG and, Z., Xue, "Research
on the security of WPA/wpa2 protocol,"
Information Security and Communications
Privacy, vol. 1, no. 7, pp.106-108, 2012.
[2]. C. P. Kohlios and T. Hayajneh, “A
Comprehensive Attack Flow Model and
Security Analysis for Wi-Fi and
WPA3,” MDPI, 30-Oct-2018. [Online].
Available: https://www.mdpi.com/2079-
9292/7/11/284/htm. [Accessed: 03-Jun-
2019].
[3]. D. Goodin, “Serious flaws leave WPA3
vulnerable to hacks that steal Wi-Fi
passwords,” Ars Technica, 11-Apr-2019.
[Online]. Available:
https://arstechnica.com/information-
technology/2019/04/serious-flaws-leave-
DATA ANALYSIS
It is a critical piece of research technique as it gives a
reliable and exact outcome. Further, a few strategies
could be executed to break down information like
Excel, content investigation, and SPSS. There are
various methodologies of information investigation
include in the research such as inferential, descriptive
content, statistical and measurable. For this thesis, the
descriptive content examination is utilized by a
specialist to decipher the gathered information.
Moreover, Ms-exceed expectation programming is
utilized to display the data through various pie
outlines, charts, and bar graph. It helped in obtaining
the aims and goals of the research and analyzing the
collected data from the literature review.
RESULTS
From the above discussion, it has found that WPA is
more secure and effective protocol rather than WEP
due to which it can be used for wireless networks and
systems. There are major two points associated with
the WPA including the privacy of data and
performance of computing networks. It is observed
that the WAP 3 is an advanced network protocol that
has the potential to control and evaluate the private
and public networks effectively [15]. The proposed
research provided a way where the students can
understand the benefits and threats associated with
the WPA protocols. A recent study identified that
security is a common issue that impacts on the
performance of wireless networks and WEP is not
much secure due to which users may suffer from the
data privacy issues [12]. In order to control and
reduce drawbacks of the WEP protocols, WPA
networks were implemented that has the capability to
improve the overall effectiveness of the computing
networks and servers.
From the above evaluation, it has found that the
WPA protocol uses the concept of TKIP system
along with the security encryption technique for
improving the privacy of the communication
channels used in the computer devices. The major
problem linked with the WPA 2 network is that it is
not able to control and avoid security threats linked
with the WPA and WEP networks. It is stated that
WPA 3 is a more secure and appropriate protocol that
included the features of SAE network and also
developed an advanced encryption process for
providing secured authentic keys to the users [14].
The selected research methodologies help for finding
and evaluating the reliable information about the
WPA networks and also reduced gaps occurred in the
research [13]. However, still, it is very complex for
consumers to handle security attacks and threats from
the wireless networks including DDOS attack,
malware attack, ransomware, and so on. The previous
papers focused on the security issues linked with the
wireless networks and WPA protocols but the current
investigation enabled the students for understanding
security features and advantages of WPA and other
variants of the WPA protocols. Therefore, it is
suggested that users should ensure that wireless
networks are connected with secured WPA protocols
and servers.
CONCLUSION
From the above investigation, it is concluded that
WPA 3 is more advanced and secured protocol rather
than WEP and WPA 2 because it uses the concept of
SAE along with the AES authentic system. The
proposed research identified the advantages and
limitations of each WPA system and also compared
with the WEP protocols. From this investigation, it is
identified that WPA 3 changed the way of
communication that also addressed the issues
associated with the WEP and provided security to the
public computer networks. The major drawback of
the WPA2 is that it cannot be used for securing the
large computing networks and public servers and it
may be resolved with the help of WPA 3 protocol.
WPA 2 still did not resolve the security threats
associated with the WPA but handled numbers of
vulnerabilities occurred in the WEP including MITM
attack, and so on. It is stated that the findings of the
proposed study appropriately impact on the selected
topic and the students will be able to enhance their
skills in the area of WPA protocols along with the
security threats.
REFERENCES
[1]. S., Bai, Y.J. WANG and, Z., Xue, "Research
on the security of WPA/wpa2 protocol,"
Information Security and Communications
Privacy, vol. 1, no. 7, pp.106-108, 2012.
[2]. C. P. Kohlios and T. Hayajneh, “A
Comprehensive Attack Flow Model and
Security Analysis for Wi-Fi and
WPA3,” MDPI, 30-Oct-2018. [Online].
Available: https://www.mdpi.com/2079-
9292/7/11/284/htm. [Accessed: 03-Jun-
2019].
[3]. D. Goodin, “Serious flaws leave WPA3
vulnerable to hacks that steal Wi-Fi
passwords,” Ars Technica, 11-Apr-2019.
[Online]. Available:
https://arstechnica.com/information-
technology/2019/04/serious-flaws-leave-
RESEARCH PAPER 6
wpa3-vulnerable-to-hacks-that-steal-wi-fi-
passwords/. [Accessed: 03-Jun-2019].
[4]. G. Phillips, “WEP vs. WPA vs. WPA2 vs.
WPA3: Wi-Fi Security Types Explained,”
MakeUseOf, 16-Jan-2019. [Online].
Available:
https://www.makeuseof.com/tag/wep-wpa-
wpa2-wpa3-explained/. [Accessed: 03-Jun-
2019].
[5]. T.A.B., Gali, A. Amin Babiker and, N.,
Mustafa, “A comparative study between
WEP, WPA and WPA2 security
algorithms,” International Journal of
Science and Research ISSN, vol. 12, no. 6,
pp.2319-7064, 2015.
[6]. M., Khasawneh, I., Kajman, R. Alkhudaidy
and, A., Althubyani, “A survey on Wi-Fi
protocols: WPA and WPA2,”
In International Conference on Security in
Computer Networks and Distributed
Systems, vol. 7, no. 5, pp. 496-511, 2014.
[7]. V., Kumar, A., Tiwari, P., Tiwari, A. Gupta
and, S., Shrawne, “Vulnerabilities of
Wireless Security protocols (WEP and
WPA2),” International Journal of Advanced
Research in Computer Engineering &
Technology (IJARCET), vol. 1, no. 2, pp.34-
38, 2012.
[8]. L. Strain, “WPA3 will secure Wi-Fi
connections in four significant ways in
2018,” Malwarebytes Labs, 18-Jan-2018.
[Online]. Available:
https://blog.malwarebytes.com/security-
world/2018/01/wpa3-will-secure-wi-fi-
connections-in-four-significant-ways-in-
2018/. [Accessed: 03-Jun-2019].
[9]. R.M. Pandurang and, D.C., Karia,
“Performance measurement of WEP and
WPA2 on WLAN using OpenVPN,”
In 2015 international conference on nascent
technologies in the engineering field
(ICNTE), vol. 12, no. 7, pp. 1-4, 2015.
[10]. K.G., Paterson, B. Poettering and,
J.C., Schuldt, “Plaintext recovery attacks
against WPA/TKIP,” In International
Workshop on Fast Software Encryption, vol.
4, no. 2, pp. 325-349, 2014.
[11]. V. Poddar and, H., Choudhary, “A
Comparitive Analysis of Wireless Security
Protocols (WEP And WPA2),” Int. J.
AdHoc Netw. Syst. (IJANS), vol. 4, no. 3, pp.
12-18, 2014.
[12]. A. Sari and, M., Karay,
“Comparative analysis of wireless security
protocols: WEP vs WPA,” International
Journal of Communications, Network and
System Sciences, vol. 8, no. 12, p.483, 2015.
[13]. M. Vanhoef and, F., Piessens, “All
Your Biases Belong to Us: Breaking RC4 in
WPA-TKIP and {TLS},” In 24th {USENIX}
Security Symposium ({USENIX} Security,
vol. 15, no. 7, pp. 97-112, 2015.
[14]. W. G. Wong, “What's the
Difference Between WPA2 and WPA3?,”
Electronic Design, 31-Jul-2018. [Online].
Available:
https://www.electronicdesign.com/embedde
d-revolution/what-s-difference-between-
wpa2-and-wpa3. [Accessed: 03-Jun-2019].
[15]. Z. Ren, C. Chen, and L. Zhang,
“Security Protection under the Environment
of WiFi,” Security Protection under the
Environment of WiFi | Atlantis Press, 01-
Mar-2018. [Online]. Available:
https://www.atlantis-press.com/proceedings/
aetr-17/25892805. [Accessed: 03-Jun-2019].
wpa3-vulnerable-to-hacks-that-steal-wi-fi-
passwords/. [Accessed: 03-Jun-2019].
[4]. G. Phillips, “WEP vs. WPA vs. WPA2 vs.
WPA3: Wi-Fi Security Types Explained,”
MakeUseOf, 16-Jan-2019. [Online].
Available:
https://www.makeuseof.com/tag/wep-wpa-
wpa2-wpa3-explained/. [Accessed: 03-Jun-
2019].
[5]. T.A.B., Gali, A. Amin Babiker and, N.,
Mustafa, “A comparative study between
WEP, WPA and WPA2 security
algorithms,” International Journal of
Science and Research ISSN, vol. 12, no. 6,
pp.2319-7064, 2015.
[6]. M., Khasawneh, I., Kajman, R. Alkhudaidy
and, A., Althubyani, “A survey on Wi-Fi
protocols: WPA and WPA2,”
In International Conference on Security in
Computer Networks and Distributed
Systems, vol. 7, no. 5, pp. 496-511, 2014.
[7]. V., Kumar, A., Tiwari, P., Tiwari, A. Gupta
and, S., Shrawne, “Vulnerabilities of
Wireless Security protocols (WEP and
WPA2),” International Journal of Advanced
Research in Computer Engineering &
Technology (IJARCET), vol. 1, no. 2, pp.34-
38, 2012.
[8]. L. Strain, “WPA3 will secure Wi-Fi
connections in four significant ways in
2018,” Malwarebytes Labs, 18-Jan-2018.
[Online]. Available:
https://blog.malwarebytes.com/security-
world/2018/01/wpa3-will-secure-wi-fi-
connections-in-four-significant-ways-in-
2018/. [Accessed: 03-Jun-2019].
[9]. R.M. Pandurang and, D.C., Karia,
“Performance measurement of WEP and
WPA2 on WLAN using OpenVPN,”
In 2015 international conference on nascent
technologies in the engineering field
(ICNTE), vol. 12, no. 7, pp. 1-4, 2015.
[10]. K.G., Paterson, B. Poettering and,
J.C., Schuldt, “Plaintext recovery attacks
against WPA/TKIP,” In International
Workshop on Fast Software Encryption, vol.
4, no. 2, pp. 325-349, 2014.
[11]. V. Poddar and, H., Choudhary, “A
Comparitive Analysis of Wireless Security
Protocols (WEP And WPA2),” Int. J.
AdHoc Netw. Syst. (IJANS), vol. 4, no. 3, pp.
12-18, 2014.
[12]. A. Sari and, M., Karay,
“Comparative analysis of wireless security
protocols: WEP vs WPA,” International
Journal of Communications, Network and
System Sciences, vol. 8, no. 12, p.483, 2015.
[13]. M. Vanhoef and, F., Piessens, “All
Your Biases Belong to Us: Breaking RC4 in
WPA-TKIP and {TLS},” In 24th {USENIX}
Security Symposium ({USENIX} Security,
vol. 15, no. 7, pp. 97-112, 2015.
[14]. W. G. Wong, “What's the
Difference Between WPA2 and WPA3?,”
Electronic Design, 31-Jul-2018. [Online].
Available:
https://www.electronicdesign.com/embedde
d-revolution/what-s-difference-between-
wpa2-and-wpa3. [Accessed: 03-Jun-2019].
[15]. Z. Ren, C. Chen, and L. Zhang,
“Security Protection under the Environment
of WiFi,” Security Protection under the
Environment of WiFi | Atlantis Press, 01-
Mar-2018. [Online]. Available:
https://www.atlantis-press.com/proceedings/
aetr-17/25892805. [Accessed: 03-Jun-2019].
RESEARCH PAPER 7
Appendix
Paper Proposal
Name : Mohammed Nestaz
Uni ID :
Working Title : A Survey on the security benefits and
threats of WPA
Outline
References
In this
WPA or Wi-Fi Protected Access is a security technology for Wi-Fi networks.
Developed by the Wi-Fi Alliance, it was to provide better data encryption and user
authentication than Wired Equivalent Privacy or WEP. There are currently three
variations of WPA, mainly Wi-Fi Protected Access (WPA) released on 2003, Wi-Fi
Protected Access II (WPA2) released on 2004, and Wi-Fi Protected Access 3
(WPA3) released on 2018, with each release fixing issues, introducing features.
This survey will explore the three variations of WPA
1. Security features which each variation provides
o Includes the Authentication Key Distribution, Encryption Protocols
and EAP or Extensible Authentication Protocol extensions
2. Benefits each variation brings over the previous variation
o How it improved over the previous variation including advantage
over WEP
3. Security threats which each suffered
o Includes on how it was addressed if has already been addressed.
C. P. Kohlios and T. Hayajneh, “A Comprehensive Attack Flow Model and Security Analysis
for Wi-Fi and WPA3,” MDPI, 30-Oct-2018. [Online]. Available:
https://www.mdpi.com/2079-9292/7/11/284/htm. [Accessed: 03-Jun-2019].
Z. Ren, C. Chen, and L. Zhang, “Security Protection under the Environment of WiFi,”
Security Protection under the Environment of WiFi | Atlantis Press, 01-Mar-2018. [Online].
Available: https://www.atlantis-press.com/proceedings/aetr-17/25892805. [Accessed: 03-
Jun-2019].
L. Strain, “WPA3 will secure Wi-Fi connections in four significant ways in 2018,”
Malwarebytes Labs, 18-Jan-2018. [Online]. Available:
https://blog.malwarebytes.com/security-world/2018/01/wpa3-will-secure-wi-fi-
connections-in-four-significant-ways-in-2018/. [Accessed: 03-Jun-2019].
W. G. Wong, “What's the Difference Between WPA2 and WPA3?,” Electronic Design, 31-
Jul-2018. [Online]. Available:
Appendix
Paper Proposal
Name : Mohammed Nestaz
Uni ID :
Working Title : A Survey on the security benefits and
threats of WPA
Outline
References
In this
WPA or Wi-Fi Protected Access is a security technology for Wi-Fi networks.
Developed by the Wi-Fi Alliance, it was to provide better data encryption and user
authentication than Wired Equivalent Privacy or WEP. There are currently three
variations of WPA, mainly Wi-Fi Protected Access (WPA) released on 2003, Wi-Fi
Protected Access II (WPA2) released on 2004, and Wi-Fi Protected Access 3
(WPA3) released on 2018, with each release fixing issues, introducing features.
This survey will explore the three variations of WPA
1. Security features which each variation provides
o Includes the Authentication Key Distribution, Encryption Protocols
and EAP or Extensible Authentication Protocol extensions
2. Benefits each variation brings over the previous variation
o How it improved over the previous variation including advantage
over WEP
3. Security threats which each suffered
o Includes on how it was addressed if has already been addressed.
C. P. Kohlios and T. Hayajneh, “A Comprehensive Attack Flow Model and Security Analysis
for Wi-Fi and WPA3,” MDPI, 30-Oct-2018. [Online]. Available:
https://www.mdpi.com/2079-9292/7/11/284/htm. [Accessed: 03-Jun-2019].
Z. Ren, C. Chen, and L. Zhang, “Security Protection under the Environment of WiFi,”
Security Protection under the Environment of WiFi | Atlantis Press, 01-Mar-2018. [Online].
Available: https://www.atlantis-press.com/proceedings/aetr-17/25892805. [Accessed: 03-
Jun-2019].
L. Strain, “WPA3 will secure Wi-Fi connections in four significant ways in 2018,”
Malwarebytes Labs, 18-Jan-2018. [Online]. Available:
https://blog.malwarebytes.com/security-world/2018/01/wpa3-will-secure-wi-fi-
connections-in-four-significant-ways-in-2018/. [Accessed: 03-Jun-2019].
W. G. Wong, “What's the Difference Between WPA2 and WPA3?,” Electronic Design, 31-
Jul-2018. [Online]. Available:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
RESEARCH PAPER 8
1 out of 8
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.