Abdillahi Hasan Adnan, Mohamed Abdirazak, A. B. M. S. Sadi, Towfique Anam, S. Khan, Mohammed Mostafizur Rahman, M. Omar
{"title":"无线局域网安全协议:WPA、WPA2的比较研究","authors":"Abdillahi Hasan Adnan, Mohamed Abdirazak, A. B. M. S. Sadi, Towfique Anam, S. Khan, Mohammed Mostafizur Rahman, M. Omar","doi":"10.1109/ICAEE.2015.7506822","DOIUrl":null,"url":null,"abstract":"In this paper, we have made a comparison between different WLAN security protocols, WPA and WPA2, and we correlated the two with respect to performance. We have emphasized on IEEE 802.11n amendment. We performed an experiment to measure the maximum throughput achieved by different encryption protocols. We concluded that WPA2 has less reduction on network throughput than WPA due to its encryption algorithm, CCMP, which is highly improved compared to TKIP, which is adopted by WPA.","PeriodicalId":123939,"journal":{"name":"2015 International Conference on Advances in Electrical Engineering (ICAEE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"34","resultStr":"{\"title\":\"A comparative study of WLAN security protocols: WPA, WPA2\",\"authors\":\"Abdillahi Hasan Adnan, Mohamed Abdirazak, A. B. M. S. Sadi, Towfique Anam, S. Khan, Mohammed Mostafizur Rahman, M. Omar\",\"doi\":\"10.1109/ICAEE.2015.7506822\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we have made a comparison between different WLAN security protocols, WPA and WPA2, and we correlated the two with respect to performance. We have emphasized on IEEE 802.11n amendment. We performed an experiment to measure the maximum throughput achieved by different encryption protocols. We concluded that WPA2 has less reduction on network throughput than WPA due to its encryption algorithm, CCMP, which is highly improved compared to TKIP, which is adopted by WPA.\",\"PeriodicalId\":123939,\"journal\":{\"name\":\"2015 International Conference on Advances in Electrical Engineering (ICAEE)\",\"volume\":\"48 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"34\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on Advances in Electrical Engineering (ICAEE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAEE.2015.7506822\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Advances in Electrical Engineering (ICAEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAEE.2015.7506822","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A comparative study of WLAN security protocols: WPA, WPA2
In this paper, we have made a comparison between different WLAN security protocols, WPA and WPA2, and we correlated the two with respect to performance. We have emphasized on IEEE 802.11n amendment. We performed an experiment to measure the maximum throughput achieved by different encryption protocols. We concluded that WPA2 has less reduction on network throughput than WPA due to its encryption algorithm, CCMP, which is highly improved compared to TKIP, which is adopted by WPA.