Skip to main content
Top

2021 | OriginalPaper | Chapter

An Extensive Review of Wireless Local Area Network Security Standards

Authors : Sudeshna Chakraborty, Maliha Khan, Amrita, Preeti Kaushik, Zia Nasseri

Published in: Applications of Artificial Intelligence and Machine Learning

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

During recent times, wireless local area network is very important and changed to a vital topic since the World Wide Web was introduced in 1995; we have many types of wireless network such as wireless local area network, wireless communication, wireless application protocol (WAP), wireless transaction and WMAN. Among all these types, WLAN gained much popularity and used widely in today’s world in many areas for different purposes: office, airport, library, university, hospital, military campus and many more. In another hand, the security of all these functionalities has become a crucial topic in today’s WLAN due to not existing any physical border around WLAN channel, so that, the security of information can be leaked by attackers very easy. For these purposes, IEEE introduced very famous security standards like WEP, WPA and WPA2 for securing communication between two endpoints. This survey gives a brief introduction to types of WLAN security, to study types of attack in wireless LAN, the vulnerabilities, and study on the existing security standards and will focus more on WPA2 which fix the problem of WEP and WPA and then explore the vulnerability of each standard; finally, this paper will end up with some useful mitigation and suggestion how to improve the wireless LAN security.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Suroto S (2018) WLAN security: threats and countermeasures. Int J Inform Vis 2(4):232 Suroto S (2018) WLAN security: threats and countermeasures. Int J Inform Vis 2(4):232
2.
go back to reference Somaiya RC, Gonsai AM, Tanna RS (2016) WLAN security and efficiency issue based on encryption algorithm Somaiya RC, Gonsai AM, Tanna RS (2016) WLAN security and efficiency issue based on encryption algorithm
3.
go back to reference Ma Y, Ning H (2018) The improvement of wireless LAN security authentication mechanism based on Kerberos. IEEE Ma Y, Ning H (2018) The improvement of wireless LAN security authentication mechanism based on Kerberos. IEEE
4.
go back to reference Somaiya RC, WLAN security and efficiency issues based on encryption techniques. Int J Res Eng IT Social Sci 6(9):27–32 Somaiya RC, WLAN security and efficiency issues based on encryption techniques. Int J Res Eng IT Social Sci 6(9):27–32
5.
go back to reference Saleh ME, Aly AA, Omara FA (2016) Data security using cryptography and steganography techniques. Int J Adv Comput Sci Appl 7(6):390–397 Saleh ME, Aly AA, Omara FA (2016) Data security using cryptography and steganography techniques. Int J Adv Comput Sci Appl 7(6):390–397
6.
go back to reference Khasawneh M, Kajman I, Alkhudaidy R (2014) A survey on wifi protocols. In: International conference on security in computer networks and distributed systems Khasawneh M, Kajman I, Alkhudaidy R (2014) A survey on wifi protocols. In: International conference on security in computer networks and distributed systems
7.
go back to reference Ning H, Ma Y (2018) The improvement of wireless LAN security authentication mechanism based on Kerberos. In: International conference on electronics technology, vol 06, no 04, pp 87–98 Ning H, Ma Y (2018) The improvement of wireless LAN security authentication mechanism based on Kerberos. In: International conference on electronics technology, vol 06, no 04, pp 87–98
8.
go back to reference Chaitanya SBS, Kokil P (2013) Implementation of cryptographic algorithm for secure wireless communication. Int J Sci Res (IJSR) 5(6) Chaitanya SBS, Kokil P (2013) Implementation of cryptographic algorithm for secure wireless communication. Int J Sci Res (IJSR) 5(6)
9.
go back to reference Dhiman D (2017) WLAN security issues and solutions. IOSR J Comput Eng (IOSR-JCE) 16(1):67–75 Dhiman D (2017) WLAN security issues and solutions. IOSR J Comput Eng (IOSR-JCE) 16(1):67–75
10.
go back to reference A. E., Wireless local area network security enhancement through penetration testing. Int J Comput Netw Commun Secur 4:114–129 A. E., Wireless local area network security enhancement through penetration testing. Int J Comput Netw Commun Secur 4:114–129
11.
go back to reference Indrabi SJ, Saini N, Mohan M (2018) Secure data transmission based on combined effect of cryptography and steganography using vislible light spectrum. Int J Pure Appl Math 118(20):2851–2859 Indrabi SJ, Saini N, Mohan M (2018) Secure data transmission based on combined effect of cryptography and steganography using vislible light spectrum. Int J Pure Appl Math 118(20):2851–2859
12.
go back to reference Islam MA (2017) Secure wireless text message transmission with the implementation of RSA cryptography algorithm. Int J Comput Netw Commun Secur 2 Islam MA (2017) Secure wireless text message transmission with the implementation of RSA cryptography algorithm. Int J Comput Netw Commun Secur 2
13.
go back to reference Bittau A, Lackey J, Handley M (2006) Security and privacy. IEEE Symposium 2006:15–40 Bittau A, Lackey J, Handley M (2006) Security and privacy. IEEE Symposium 2006:15–40
Metadata
Title
An Extensive Review of Wireless Local Area Network Security Standards
Authors
Sudeshna Chakraborty
Maliha Khan
Amrita
Preeti Kaushik
Zia Nasseri
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-16-3067-5_44

Premium Partner