Date Added: Jun 2009
This paper presents the process for overcoming the downtrend challenges in the field of networks and security. Wireless networks do not have the inbuilt physical security of wired networks so are more prone to attacks from intruders. Numerous tools, to complicate matters, which attackers could use to detect and connect to a wireless network, exist. WEP is a wireless security protocol which provides data privacy and uses a shared key, to encrypt traffic prior to its transmission. RC4 encryption algorithm is a stream cipher used by WEP for encryption.