Abdillahi Hasan Adnan, Mohamed Abdirazak, A. B. M. S. Sadi, Towfique Anam, S. Khan, Mohammed Mostafizur Rahman, M. Omar
{"title":"A comparative study of WLAN security protocols: WPA, WPA2","authors":"Abdillahi Hasan Adnan, Mohamed Abdirazak, A. B. M. S. Sadi, Towfique Anam, S. Khan, Mohammed Mostafizur Rahman, M. Omar","doi":"10.1109/ICAEE.2015.7506822","DOIUrl":null,"url":null,"abstract":"In this paper, we have made a comparison between different WLAN security protocols, WPA and WPA2, and we correlated the two with respect to performance. We have emphasized on IEEE 802.11n amendment. We performed an experiment to measure the maximum throughput achieved by different encryption protocols. We concluded that WPA2 has less reduction on network throughput than WPA due to its encryption algorithm, CCMP, which is highly improved compared to TKIP, which is adopted by WPA.","PeriodicalId":123939,"journal":{"name":"2015 International Conference on Advances in Electrical Engineering (ICAEE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"34","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Advances in Electrical Engineering (ICAEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAEE.2015.7506822","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 34
Abstract
In this paper, we have made a comparison between different WLAN security protocols, WPA and WPA2, and we correlated the two with respect to performance. We have emphasized on IEEE 802.11n amendment. We performed an experiment to measure the maximum throughput achieved by different encryption protocols. We concluded that WPA2 has less reduction on network throughput than WPA due to its encryption algorithm, CCMP, which is highly improved compared to TKIP, which is adopted by WPA.