Article Fingerprint
ReserarchID
X71H4
WPA and WPA2 (Wi-Fi Protected Access) is a certification program developed by the Wi-Fi Alliance to indicate compliance with the security protocol created by the WiFi Alliance to secure wireless networks. The Alliance defined the protocol in response to several weaknesses researchers had found in the previous system: Wired Equivalent Privacy (WEP). Many sophisticated authentication and encryption techniques have been embedded into WPA2 but it still facing a lot of challenging situations. In this paper we discuss the benefit of WPA2, its vulnerability & weakness .This paper also present solutions or suggestions which will improve Wi-Fi Protected Access 2 (WPA2) protocol.
Shamim Ahmed. 1970. \u201cWPA 2 (Wi-Fi Protected Access 2) Security Enhancement: Analysis & Improvement\u201d. Unknown Journal GJCST Volume 12 (GJCST Volume 12 Issue 6): .
Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.
Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.
Total Score: 105
Country: Unknown
Subject: Uncategorized
Authors: A.K.M. Nazmus Sakib, Shamim Ahmed, Samiur Rahman, Ishtiaque Mahmud, Md. Habibullah Belali (PhD/Dr. count: 0)
View Count (all-time): 147
Total Views (Real + Logic): 20605
Total Downloads (simulated): 10742
Publish Date: 1970 01, Thu
Monthly Totals (Real + Logic):
This paper attempted to assess the attitudes of students in
Advances in technology have created the potential for a new
Inclusion has become a priority on the global educational agenda,
WPA and WPA2 (Wi-Fi Protected Access) is a certification program developed by the Wi-Fi Alliance to indicate compliance with the security protocol created by the WiFi Alliance to secure wireless networks. The Alliance defined the protocol in response to several weaknesses researchers had found in the previous system: Wired Equivalent Privacy (WEP). Many sophisticated authentication and encryption techniques have been embedded into WPA2 but it still facing a lot of challenging situations. In this paper we discuss the benefit of WPA2, its vulnerability & weakness .This paper also present solutions or suggestions which will improve Wi-Fi Protected Access 2 (WPA2) protocol.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.