Key Agreement & Authentication Protocol for IEEE 802.11

Article ID

IUVY3

Key Agreement & Authentication Protocol for IEEE 802.11

A.K.M. Nazmus Sakib
A.K.M. Nazmus Sakib Chittagong University of Engineering & Technology
Fauzia Yasmeen
Fauzia Yasmeen
Samiur Rahman
Samiur Rahman
Md.Monjurul Islam
Md.Monjurul Islam
Prof. Dr. Md. Matiur Rahaman Mian
Prof. Dr. Md. Matiur Rahaman Mian
DOI

Abstract

WPA and WPA2 (Wi-Fi Protected Access) is a certification program developed by the Wi-Fi Alliance to indicate compliance with the security protocol created by the WiFi alliance to secure wireless networks. The alliance defined the protocol in response to several weaknesses researchers had found in the previous Wired Equivalent Privacy (WEP) system. Many sophisticated authentication and encryption techniques have been embedded into WPA but it is still facing a lot of challenging situations. In this paper we discuss the vulnerability & weakness of WPA. This paper also present solutions or suggestions which will improve Wi-Fi Protected Access (WPA) protocol. We provide a brief description of the different functional entities and we investigate several technical issues including infrastructure and aspects related to the AAA (Authentication, Authorization, and Accounting) procedures for users as well as the system security. Also we suggest different key agreement algorithm & encryption techniques.

Key Agreement & Authentication Protocol for IEEE 802.11

WPA and WPA2 (Wi-Fi Protected Access) is a certification program developed by the Wi-Fi Alliance to indicate compliance with the security protocol created by the WiFi alliance to secure wireless networks. The alliance defined the protocol in response to several weaknesses researchers had found in the previous Wired Equivalent Privacy (WEP) system. Many sophisticated authentication and encryption techniques have been embedded into WPA but it is still facing a lot of challenging situations. In this paper we discuss the vulnerability & weakness of WPA. This paper also present solutions or suggestions which will improve Wi-Fi Protected Access (WPA) protocol. We provide a brief description of the different functional entities and we investigate several technical issues including infrastructure and aspects related to the AAA (Authentication, Authorization, and Accounting) procedures for users as well as the system security. Also we suggest different key agreement algorithm & encryption techniques.

A.K.M. Nazmus Sakib
A.K.M. Nazmus Sakib Chittagong University of Engineering & Technology
Fauzia Yasmeen
Fauzia Yasmeen
Samiur Rahman
Samiur Rahman
Md.Monjurul Islam
Md.Monjurul Islam
Prof. Dr. Md. Matiur Rahaman Mian
Prof. Dr. Md. Matiur Rahaman Mian

No Figures found in article.

A.K.M. Nazmus Sakib. 1970. “. Unknown Journal GJCST Volume 11 (GJCST Volume 11 Issue 20): .

Download Citation

Journal Specifications
Issue Cover
GJCST Volume 11 Issue 20
Pg. 59- 64
Classification
Not Found
Article Matrices
Total Views: 20858
Total Downloads: 10755
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Key Agreement & Authentication Protocol for IEEE 802.11

A.K.M. Nazmus Sakib
A.K.M. Nazmus Sakib Chittagong University of Engineering & Technology
Fauzia Yasmeen
Fauzia Yasmeen
Samiur Rahman
Samiur Rahman
Md.Monjurul Islam
Md.Monjurul Islam
Prof. Dr. Md. Matiur Rahaman Mian
Prof. Dr. Md. Matiur Rahaman Mian

Research Journals