WPA 2 (Wi-Fi Protected Access 2) Security Enhancement: Analysis & Improvement

Article ID

X71H4

WPA 2 (Wi-Fi Protected Access 2) Security Enhancement: Analysis & Improvement

A.K.M. Nazmus Sakib
A.K.M. Nazmus Sakib Chittagong University of Engineering & Technology
Shamim Ahmed
Shamim Ahmed Dhaka International University, Dhaka, Bangladesh
Samiur Rahman
Samiur Rahman
Ishtiaque Mahmud
Ishtiaque Mahmud
Md. Habibullah Belali
Md. Habibullah Belali
DOI

Abstract

WPA and WPA2 (Wi-Fi Protected Access) is a certification program developed by the Wi-Fi Alliance to indicate compliance with the security protocol created by the WiFi Alliance to secure wireless networks. The Alliance defined the protocol in response to several weaknesses researchers had found in the previous system: Wired Equivalent Privacy (WEP). Many sophisticated authentication and encryption techniques have been embedded into WPA2 but it still facing a lot of challenging situations. In this paper we discuss the benefit of WPA2, its vulnerability & weakness .This paper also present solutions or suggestions which will improve Wi-Fi Protected Access 2 (WPA2) protocol.

WPA 2 (Wi-Fi Protected Access 2) Security Enhancement: Analysis & Improvement

WPA and WPA2 (Wi-Fi Protected Access) is a certification program developed by the Wi-Fi Alliance to indicate compliance with the security protocol created by the WiFi Alliance to secure wireless networks. The Alliance defined the protocol in response to several weaknesses researchers had found in the previous system: Wired Equivalent Privacy (WEP). Many sophisticated authentication and encryption techniques have been embedded into WPA2 but it still facing a lot of challenging situations. In this paper we discuss the benefit of WPA2, its vulnerability & weakness .This paper also present solutions or suggestions which will improve Wi-Fi Protected Access 2 (WPA2) protocol.

A.K.M. Nazmus Sakib
A.K.M. Nazmus Sakib Chittagong University of Engineering & Technology
Shamim Ahmed
Shamim Ahmed Dhaka International University, Dhaka, Bangladesh
Samiur Rahman
Samiur Rahman
Ishtiaque Mahmud
Ishtiaque Mahmud
Md. Habibullah Belali
Md. Habibullah Belali

No Figures found in article.

Shamim Ahmed. 1970. “. Unknown Journal GJCST Volume 12 (GJCST Volume 12 Issue 6): .

Download Citation

Journal Specifications
Classification
Not Found
Article Matrices
Total Views: 20519
Total Downloads: 10708
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

WPA 2 (Wi-Fi Protected Access 2) Security Enhancement: Analysis & Improvement

A.K.M. Nazmus Sakib
A.K.M. Nazmus Sakib Chittagong University of Engineering & Technology
Shamim Ahmed
Shamim Ahmed Dhaka International University, Dhaka, Bangladesh
Samiur Rahman
Samiur Rahman
Ishtiaque Mahmud
Ishtiaque Mahmud
Md. Habibullah Belali
Md. Habibullah Belali

Research Journals