Date Added: Jan 2012
In recent years, wireless networks have gained rapid popularity. Wireless networks are inexpensive and provides mobility but they are prone to a variety of threats like denial of service, replay attacks, eavesdropping and data modification. This paper discusses the three wireless security protocols with details about the encryption methods used, authentication mechanisms and their limitations. This paper explains the evolution of security for wireless networks. The paper provides a comparative study between three major security protocols: Wired Equivalent Privacy (WEP), Wi-fi Protected Access (WPA) and Wi-fi Protected Access 2 (WPA2).