A Survey on Wi-Fi Protocols: WPA and WPA2

  • Mahmoud Khasawneh
  • Izadeen Kajman
  • Rashed Alkhudaidy
  • Anwar Althubyani
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 420)


Wireless Network (Wi-Fi) becomes extremely popular over the world on the lastly two decades. Nowadays, most people are using the wireless networks for online banking and shopping. It also allows people to share information and communicate with each other whenever and wherever they are. Moreover, it has the advantages of flexibility and freedom of mobility and enables smart phones and laptops to provide a rapid and easy access to information. All of that makes the protection of the wireless network highly demanded to be existed. Therefore, security should be applied on Wi-Fi networks to keep users’ confidentiality and privacy. Hence, different protocols have been developed and applied. Nowadays, Wi-Fi Protected Access (WPA, and WPA2) protocols are considered as the most applied protocols in wireless networks over the world. In this paper, we discuss the advantages, vulnerability, and the weaknesses of both of these protocols. This paper ends up with some suggestions on how to improve the functionality of these protocols.


Wi-Fi Security WPA WPA2 Confidentiality 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Mylonas, P., Mavridis, I.P., Androulakis, A.-I.E., Halkias, A.B.: Real-life paradigms of wireless network security attacks (2011)Google Scholar
  2. 2.
    Sukhija, S., Gupta, S.: Wireless Network Security Protocols A Comparative Study (January 2012)Google Scholar
  3. 3.
    Lehembre, G.: Wi-Fi security – WEP, WPA and WPA2 (June 2005)Google Scholar
  4. 4.
    Mathews, M., Hunt, R.: Evolution of Wireless LAN Security Architecture to IEEE 802.11i (WPA2). In: Proceedings of the fourth IASTED Asian Conference on Communication Systems and Networks (2007)Google Scholar
  5. 5.
    Lehembre, G.: ―Wi-Fi security –WEP, WPA and WPA2‖, Article published in number 1/2006 (14) of hakin9 (January 2006), Publication on,
  6. 6.
    Turab, N., Masadeh, S.: ―Recommendations guide for WLAN Security. The International Journal of ACM 1(1) (March 2010)Google Scholar
  7. 7.
    Park, S.H., Ganz, A., Ganz, Z.: ―Security protocol for IEEE 802.11 wireless local area network. Mobile Networks and Applications 3 (1998)Google Scholar
  8. 8.
    Katz, F.H.: ―WPA vs. WPA2: Is WPA2 Really an Improvement on WPA? In: 2010 4th Annual Computer Security Conference (CSC 2010), Coastal Carolina University, Myrtle Beach, SC, April 15-16 (2010)Google Scholar
  9. 9.
    Frankel, S., Eydt, B., Owens, L., Scarfone, K.: Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i, NIST Special Publication 800-97, National Institute of Standards and Technology (2007)Google Scholar
  10. 10.
    Lashkari, A.H., Danesh, M.M.S., Samadi, B.: FCSIT. A survey on wireless security protocols (WEP, WPA and WPA2/802.11i). In: 2nd IEEE International Conference on Computer Science and Information Technology, ICCSIT (2009)Google Scholar
  11. 11.
    Benton, K.: ―The evolution of 802.11 wireless security‖, INF 795. UNLV Informatics-Spring (April 18, 2010)Google Scholar
  12. 12.
    Beck, M., Tews, E.: ―Practical attacks against WEP and WPA‖. In: WiSec 2009: Proceedings of the Second ACM Conference on Wireless Network Security. ACM, New York (2009)Google Scholar
  13. 13.
    Arockiam, L., Vani, B.: ―A Survey of Denial of Service Attacks and its Countermeasures on Wireless Network‖. International Journal on Computer Science and Engineering 2(5), 1563–1571 (2010)Google Scholar
  14. 14.
    Arockiam, L., Vani, B.: ―A Survey of Denial of Service Attacks and its Countermeasures on Wireless Network. International Journal on Computer Science and Engineering 2(5), 1563–1571 (2010)Google Scholar
  15. 15.
    Bulbul, H.I., Batmaz, I., Ozel, M.: Wireless Network Security: Comparison of WEP (WiredEquivalent Privacy) Mechanism, WPA (Wi-Fi ProtectedAccess) and RSN (Robust Security Network) Security Protocols, e-Forensics 2008, Adelaide, Australia, January 21-23 (2008)Google Scholar
  16. 16.
    Miller, B.: WPA2 Security: Choosing the Right WLAN Authentication Method for Homes and Enterprises. Global Knowledge (2008)Google Scholar
  17. 17.
    Macmichael, J.L.: Auditing Wi-Fi Protected Access (WPA) Pre-Shared Key Mode. Linux Journal (137), 56, 58–60 (2005)Google Scholar
  18. 18.
    Cracking Wireless. Ryan Curtin Ryan at,
  19. 19.
    De Rango, F., Lentini, D.C., Marano, S.: Static and dynamic 4-wayhandshake solutions to avoid denial of service attack in Wi-Fi protected access and IEEE 802. I li. EURASIP 1. Wire!’ Commun. Netw. (2) (April 2006)Google Scholar
  20. 20.
    Scarfone, K., Dicoi, D., Sexton, M., Tibbs, C.: Recommendations of the National Institute of Standards and Technology. Guide to Securing Legacy IEEE 802.11 Wireless Networks (July 2008)Google Scholar
  21. 21.
    Wang, Y., Jin, Z., Zhao, X.: Practical Defence against WEP and WPA-PSK Attack for WLAN (September 2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Mahmoud Khasawneh
    • 1
  • Izadeen Kajman
    • 1
  • Rashed Alkhudaidy
    • 1
  • Anwar Althubyani
    • 1
  1. 1.Faculty of Engineering and Computer ScienceConcordia UniversityMontrealCanada

Personalised recommendations