Downloads: 101
Sudan | Communication Science | Volume 4 Issue 5, May 2015 | Pages: 2390 - 2391
A Comparative Study between WEP, WPA and WPA2 Security Algorithms
Abstract: This paper is a review study of the different security techniques that used to protect wireless networks from hackers. The main goal of this is to understand the concept of security techniques in the network and knowledge of the strengths and weakness points of these techniques in this field.
Keywords: Wireless LAN, security technique, Wired Equivalent Privacy, Wi-Fi Protected Access, Wi-Fi Protected Access 2
Rating submitted successfully!
Received Comments
No approved comments available.