logo

Wi-Fi Protected Access: A Secure Communication Protocol

12 Pages782 Words60 Views
   

Added on  2023-06-15

About This Document

This presentation provides an overview of Wi-Fi Protected Access (WPA), a security protocol for creating a secured wireless network. It explains how WPA works, its advantages and disadvantages, and its comparison to other security technologies. The presentation also discusses the future of WPA and its applications in wired and wireless communications.

Wi-Fi Protected Access: A Secure Communication Protocol

   Added on 2023-06-15

ShareRelated Documents
Secure
Communications
Wi-Fi Protected access
Eli, Jama, Saumya &
Waheed
Wi-Fi Protected Access: A Secure Communication Protocol_1
Introduction
The Wi-fi Protected Access is mainly the security standard that is set
for handling the users of computing the devices. (Au, 2016)
It is mainly equipped with a proper wireless internet connection that is
mainly to improve the security standards and the sophisticated data
encryption.
Wi-Fi Protected Access: A Secure Communication Protocol_2
Objective
WPA: WPA is mainly for handling the message integrity
check, with extended initialisation vector and re-keying
mechanism.
How does it work: It works on the Remote
Authentication Dial in User Service with access to the
device credentials so that the users can be
authenticated before they are connected to the network.
Where is it used: configuring security on home
networks, office etc.
Pros & Cons: It provides a better and stronger user
authentication like RADIUS to authenticate the user. The
Wi-Fi Protected Access: A Secure Communication Protocol_3
What is WPA
It is a security protocol which has been for creating a
secured wireless network.
They tend to offer the improvement with handling
security keys and working on the systems on the
beginning and end of data transfer. (Linkola et al.,
2016).
The standards are set for using the temporal key
integrity protocol that prevents the intruders from
creating own encryption key to match by secured
network.
Wi-Fi Protected Access: A Secure Communication Protocol_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Report on Data Encryption Standards for WiMAX networks
|9
|1865
|56

Understanding WPA, WEP, and WAP for Wi-Fi Security
|3
|693
|256

ADVANCE NETWORK SECURITY Name of the University Author's Name
|13
|3219
|428

Wireless Network Access and Authentication, DSC - Graduate Diploma in ICT
|14
|3396
|360

Emerging Wireless Communication and Network Technologies
|4
|1346
|50

A Survey on the Security Benefits and Threats of WPA
|8
|5568
|59