logo

A Survey on the Security Benefits and Threats of WPA

   

Added on  2022-10-16

8 Pages5568 Words59 Views
RESEARCH PAPER 1
Abstract-WPA refers to the Wi-Fi protected access which
is used for protecting data, mobile devices and computing
networks from the unauthentic access. It is one of the
common types of the protocol which is used in the wireless
networks for performing communication activities. The
main objective of this paper is to explore and analyze WPA
revisions on its strength and weaknesses. There are major
three variants involved in this network protocol for
example mainly WPA, WPA 2 and WPA 3 which are
discussed in this research. There are major three sections
explored in this investigation, for example, security
features of WPA, benefits and security threats associated
with the WPA protocols. The researcher included numerous
research methods including qualitative design, inductive
approach, and secondary kind of data gathering technique
and so on. The author shows the benefits and features of the
WPA, WPA 2 and WPA 3 protocols and also highlighted
their advancement over the WEP networks. In the case of
WPA 3, the developers involved SAE instead of TKIP that
reduced security errors and risks. Therefore, it is identified
that WPA 3 is more secure and reliable protocol rather than
other and it can be used in the wireless networks for
exchanging data over a network.
Keywords: WPA, WEP, WPA 2, WPA 3 and SAE
INTRODUCTION
The term WPA is defined as Wi-Fi protected Access
which is a part of the security system used by the
consumers for controlling and managing the privacy
of data. Mainly, WPA was developed and
implemented by the Wi-Fi alliance to deliver more
effective encryption process and authentication
access to the consumers. It is identified that there are
major three variations of WPA system are used by
the companies in their computing networks, for
example, mainly WPA, WPA II, and WPA III that
was developed in the year 2018 [1]. The key
objective of the proposed research is to examine the
security benefits and threats associated with the WPA
technique and evaluate their different variations used
in the companies. It is very important for the users to
understand and evaluate the benefits and risks factors
linked with the Wi-Fi protection access while using
computing networks in the IT system. There are
various sections will be included in this investigation,
for example, security features of WPA, benefits of
WPA and security threats of WPA [2].
BACKGROUND
WPA is a part of the security protocol and privacy
certification program which is developed by the Wi-
Fi alliance for securing the wireless computer
networks. WPA has the potential to control and
manage security risks and threats linked with the
computer networks and it is a more effective process
rather than WEP technique. It is identified that WPA
is a more secure system that has the potential to
handle unauthentic access from the server and
provide a way where users can effectively utilize
computer networks [3]. The major focus of this
proposed research is to identify the strengths and
weakness of the WPA system and analyze different
variations developed in the last few years. It is very
important for companies to increase the security of
the computing networks because hackers are able to
block communication channels and reduce the
privacy of data but WPA is a reliable process that
may increase authorized access of the networks. It
has found that there are major three variations of the
WPA security system which are described below:
WPA
WPA II
WPA III
WPA
WPA is one of the oldest security protocols that was
developed in the year 2003 and reduced the
drawbacks or limitations of the wired equivalent
privacy system. It is identified that WPA has discrete
modes for the consumers and it is more effective and
reliable rather than WEP system due to which
numbers of users are using this protocol for securing
computer networks and devices [4].
SECURITY FEATURES OF WPA
It is identified that WPA protocol is mainly designed
and implemented for securing wireless networks and
devices and reducing the issue of unauthentic access
from the system. The security features of the WPA
are more similar to the WEP protocol but it offers an
effective way to handles security issues and threats in
the system. In terms of authentication, the WPA
provides more effective encryption protocols that can
help the users for controlling and reducing the traffic
signals from the system. A recent study identified
that there are major two kinds of encryption protocols
A Survey on the security benefits and
threats of WPA

RESEARCH PAPER 2
used in the WPA system, for example, temporal key
integrity and advanced encryption standard.
Moreover, such kind of security network also
involves authentication key distribution along with
the built-in authentication system that did not involve
in the WEP system. It is very complex for consumers
to identify the unauthentic servers from the system
but WPA provided a platform where users can
enhance the security of authorized networks and
maintain security related issues [5]. According to .,
Bai, WANG and, Xue, (2012) WPA protocol support
RADIUS servers and networks and when a computer
system connects to a WPA network, authentication
keys are produced using four-way handshake systems
that use RADIUS servers. Moreover, it uses WPA
pre-shared key while transferring data from one
network to another because of these features the
security of networks and servers may be increased
effectively.
BENEFITS OF WPA
WPA protocol is mainly developed and implemented
for reducing security risks related to wireless
networks and devices. It is an advanced version of
the WEP protocol that has the potential to control
unauthentic servers from the system and also reduced
drawbacks of WEP system. In the case of WPA, the
encryption key is changed after each frame with the
help of TKIP which is another benefit of this system.
Moreover, there are several benefits of the WPA
protocol for example, more effective, reduce errors
occurred in the WEP, helped users for securing
computer networks and allows secret encryption keys
that cannot be hacked by the criminals. As compared
with the WEP networks, WPA provided better key
management and excellent message checking process
that improves the overall performance of the
computing networks. A recent study identified that
WEP protocols use data link and physical layers of
the OSI model that does not provide end to end
security this issue may be solved with the help of
WPA protocols and users may enhance the security
of their sensitive data.
SECURITY THREATS OF WPA
It is observed that WPA is an effective security
protocol that has the capability to address security
risks and threats linked with computer networks.
WEP is not much secure due to which it cannot be
used in the IT systems and servers because it does not
provide a secure encryption technique by which
hackers can enter into the system effectively. There
are numerous kinds of security threats and risks
occurred in the wireless networks, for example,
unauthentic access, traffic signals and unwanted
servers, malware attacks, DDOS attack, rouge to
access and so on. In which authentication access and
other security risks can be addressed with the help of
WPA protocol but it is not able to reduce malware
and DDOS attacks which are major limitations of this
network. Therefore, it is stated that the WPA system
can be used by the users rather than WEP but it is
very important to focus on the privacy of data.
WPA 2
It is an advanced version of the WPA protocol which
is developed and implemented in the year 2004 for
reducing the drawbacks of the old WPA networks
and servers. The aim of the WPA II protocol is to
improve the overall performance of computer
networks and devices by reducing security threats
and attacks.
SECURITY FEATURES OF WPA 2
The security feature of the WPA protocol is mainly
based on the 802.11i IEEE standard which included
the features of advanced encryption standard for
reducing the limitations of WPA systems. It is
identified that AES is an effective system that has the
potential to provide secure authentication keys to the
consumers and provide enough security to computer
networks. Kumkar, et al., (2012) identified that the
WPA 2 uses the counter mode cipher technique that
did not include in the WPA and it also included
message authentication system that has the potential
to improve the authenticity of the user's data. As
compared with the TKIP protocol advanced
encryption standard is more effective and reliable
which is used in the WPA 2 protocol along with the
authentication protocol extensions. Therefore, it is
stated that the WPA 2 is more effective and reliable
rather than WPA and also reduced the limitations of
the WPA protocol.
BENEFITS OF WPA 2
It is identified that WPA 2 is an effective network
protocol that changed the way of communication and
provided a secured platform where users may
perform data communication processes. In the case of
WPA 2 protocol, the separation of consumer
authentication may be performed which is a major
advantage of this system over the oldest WPA
system. However, WPA 2 is more suitable and
reliable for the home networks because of their
ability to reduce traffic signals from the networks. It
is identified that WPA 2 addressed the attacks and
vulnerabilities of WEP networks by using AES type
of authentication system and also increased the
performance of wireless networks used in the
companies [7]. Such kind of communication protocol
does not require re-authenticate system because it
allows consumers to automatically connect with the

RESEARCH PAPER 3
server by performing advanced encryption
algorithms. However, it improved the effectiveness
of the wireless networks and servers over the past
WPA and WEP due to which most of the companies
are using the key aspects of WPA 2 protocols for
improving the privacy of wireless networks and
servers [8].
SECURITY THREATS OF WPA II
It is identified that the concept behind WPA 2 is
similar to the WPA but it improved the encryption
process used in the WPA that helped the users for
addressing security issues. It is argued that WPA 2
type of wireless protocol addressed vulnerabilities
and threats associated with the WEP protocols
including, MITM attack, unauthentic access, brute
force issue and so on. Unfortunately, the issue of
security attacks occurred in the Wi-Fi protected setup
is still high in the case of WPA 2 protocols that
occurred in the WPA. The issue of a malware attack
is not still addressed in the current WPA 2 due to
which the users may suffer from the data breach
issues and hacking.
WPA 3
It is the latest version of Wi-Fi protected access that
was developed and released in the year 2018 and
many companies are using this protocol in their
computer networks because of their higher reliability.
It is mainly implemented for resolving the issues
associated with the WPA 2 protocols and reduce the
security concerns faced by the users while using
wireless networks.
SECURITY FEATURES OF WPA 3
It is observed that there are major four features
included in WPA 3 for improving the performance of
wireless networks. These features include privacy on
the public networks, protections data against security
attacks, easily connecting with the computer
networks and providing larger security to the
government communities [9]. A recent investigation
identified that the developers changed the
infrastructures of security in the WPA 3 and included
the features of simultaneous authentication of equals
for improving the privacy of data.
By using the concept of SAE technique the
developers are able to improve authentication access
of the networks and helped the users for securing
their private data and information. In the case of
WPA 3 protocol opportunistic wireless encryption,
the technique is used for providing authentication
keys to the users. Such kind of process uses protected
management system in order to secure the
management traffic between the computing networks
and access points.
BENEFITS OF WPA 3
It is identified that the security of data is a major
advantage of this WPA 3 network protocol due to
which numbers of users are connected with the
networks over Wi-Fi servers. A recent study argued
that there are major three benefits of the WPA 3 over
the WEP and other variations of WPA protocols
which are described below:
In-transit security: the advanced WPA 3 protocols
128-bit encryption by the 192-bit encryption due to
which users can effectively exchange data over a
wireless network. With the help of a larger rate of bit-
encryption the issues associated with the wireless
networks may be addressed [10].
Secure authentication: As compared with the other
computer protocols WPA 3 included a new security
level called simultaneous authentication of equals
that has the ability to monitor authentication access
effectively. Moreover, it also uses the concept of
forward secrecy that protects the communication
channels and networks used by the consumers for
sending and receiving data.
Public network security: The major advantage of
the WPA 3 protocol is that it increased the security of
public networks that were the major issues linked
with the WEP and WPA 2. Therefore, with the help
of WPA 3 consumers and other third party servers
can enhance the security of private details along with
the privacy of computer networks.
SECURITY THREATS OF WPA 3
It is identified that security of Data is a major
concern associated with the wireless networks and it
can be handled with the help of WPA 3 protocols.
Therefore, it is stated that by using WPA 3 protocols
the data breach and other cybersecurity threats may
be solved but lack of privacy is the biggest issue that
may help hackers for performing malicious activities
[11].
RESEARCH METHODS
This part of the thesis proposition consolidates
diverse research approaches and methods like
research plan, ways of thinking, information
gathering procedure, and methodologies. It is
successful to get solid information and understanding
the examination issues. The point of this segment is
to build learning about the effect of authority style on
worker's fulfilment. There is an alternate article

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Wi-Fi Protected Access: A Secure Communication Protocol
|12
|782
|60

Advanced Network Security - Doc
|19
|3116
|36

Security Aspect of Wi-fi Technology: A Survey Paper Research Paper 2022
|5
|1183
|15

ADVANCE NETWORK SECURITY Name of the University Author's Name
|13
|3219
|428

Wireless Technology Security
|20
|4914
|323

Emerging Wireless Communication and Network Technologies
|4
|1346
|50