Our website is currently undergoing scheduled maintenance. We apologize for any inconvenience. Services will resume on Monday morning, and all pending papers will be uploaded accordingly.
editor@ijprems.com
WhatsApp at (+91-9098855509) Support
ijprems Logo
  • Home
  • About Us
    • Editor Vision
    • Editorial Board
    • Privacy Policy
    • Terms & Conditions
    • Publication Ethics(up)
    • Peer Review Process
  • For Authors
    • Publication Process(up)
    • Submit Paper Online
    • Pay Publication Fee
    • Track Paper
    • Copyright Form
    • Paper Format
    • Topics
  • fee
  • Indexing
  • Conference
  • Contact
  • Archieves
    • Current Issue
    • Past Issue
  • More
    • Faq
    • Join As Reviewer
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

A study of different techniques used for secure Wireless Local Area Networks

Shubhi Danpati Danpati

Download Paper

Paper Contents

Abstract

Wireless Local Area Networks (WLANs) are cost-effective and desirable gateways to mobile computing. They allow computers to be mobile, cable and communicate with speeds close to the speeds of wired LANs. These features came with an expensive price to pay in areas of security of the network. This work identifies and summarizes these security concerns and their solutions. Broadly, security concerns in the WLAN world are classified into physical and logical. The work overviews both physical and logical WLAN security problems followed by a review of the main technologies used to overcome them. It addresses logical security attacks like man-in-the-middle attacks and Denial of Service attacks as well as physical security attacks like rouge APs. Wired Equivalent Privacy (WEP) was the first logical solution to secure WLANs. However, WEP suffered many problems which were partially solved by the IEEE802.1x protocol. Towards perfection in securing WLANs, IEEE802.11i emerged as a new MAC layer standard which permanently fixes most of the security problems found in WEP and other temporary WLANs security solutions. This work reviews all security solutions starting from WEP to IEEE802.11i and discusses the strength and weaknesses of these solutions.

Copyright

Copyright © 2023 Shubhi Danpati. This is an open access article distributed under the Creative Commons Attribution License.

Paper Details
Paper ID: IJPREMS30200003575
Publish Date: 2023-02-16 23:19:30
ISSN: 2321-9653
Publisher: ijprems
Page Navigation
  • Abstract
  • Copyright
About IJPREMS

The International Journal of Progressive Research in Engineering, Management and Science is a peer-reviewed, open access journal that publishes original research articles in engineering, management, and applied sciences.

Quick Links
  • Home
  • About Our Journal
  • Editorial Board
  • Publication Ethics
Contact Us
  • IJPREMS - International Journal of Progressive Research in Engineering Management and Science, motinagar, ujjain, Madhya Pradesh., india
  • Only Whatsapp(+091) 909-885-5509
  • editor@ijprems.com
  • Mon-Fri: 9:00 AM - 5:00 PM

© 2025 International Journal of Progressive Research in Engineering, Management and Science. All Rights Reserved.

Terms & Conditions | Privacy Policy | Publication Ethics | Peer Review Process | Contact Us