1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

Research Article

Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols

  • @INPROCEEDINGS{10.4108/e-forensics.2008.2654,
        author={Halil Ibrahim BULBUL and Ihsan BATMAZ and Mesut OZEL},
        title={Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols},
        proceedings={1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia},
        publisher={ACM},
        proceedings_a={E-FORENSICS},
        year={2010},
        month={5},
        keywords={Wireless Security WEP WPA WPA2 RSN.},
        doi={10.4108/e-forensics.2008.2654}
    }
    
  • Halil Ibrahim BULBUL
    Ihsan BATMAZ
    Mesut OZEL
    Year: 2010
    Wireless network security: comparison of WEP (Wired Equivalent Privacy) mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols
    E-FORENSICS
    ACM
    DOI: 10.4108/e-forensics.2008.2654
Halil Ibrahim BULBUL1,*, Ihsan BATMAZ2,*, Mesut OZEL1,*
  • 1: Gazi University, 06830 Gölbaşõ, Ankara +90 312 4851124
  • 2: Gazi University, 06500 Beşevler, Ankara +90 312 202 8645
*Contact email: bhalil@gazi.edu.tr, ibatmaz@gazi.edu.tr, mesutozel@yahoo.com

Abstract

Wireless Local Area Networks (WLANs) are gaining popularity as they are fast, cost effective, flexible and easy to use. They are, however, faced with some serious security challenges and the choice of security protocol is a critical issue for IT administrators. The goal of this paper is to make the non-specialist reader aware of the disadvantages and threats of the wireless security protocols. WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) security protocols are examined in this respect. Then they are compared via the common features in order to give some insight to those who work with WLANs. We hope this paper give boost to the IT security staff and clarify the common questions of the nonspecialist reader. This paper is a compilation of the wireless security weaknesses and counter measures that are put forward until recently. We believe that a thorough understanding of this paper makes the non-specialist reader have a complete review of wireless security and vulnerabilities associated with it.