期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
印刷版ISSN:2320-9798
电子版ISSN:2320-9801
出版年度:2016
卷号:4
期号:2
页码:1240
DOI:10.15680/IJIRCCE.2016.0402025
出版社:S&S Publications
摘要:The focus of this work is to provide the solutions for WPA2/WEP/WPA2-PSK vulnerabilities by incorporating trusted computing in order to provide security for wireless networks. Trusted computing aims at addressing the workstation security issues by some software amendments and thus, establishing a trust relationship between clients connected to network. Trusted Computing enables binding of data to applications, users and workstations for secured communication. Therefore, in this paper the evolution of various security protocols for Wireless LANs has been discussed and a comparative study has been provided for these protocols in this paper. Also, since WPA2 is the most recommended protocol for wireless networks at present, so, various limitations of WPA2 have been examined and discussed, describes about the tools and programming language used for application implementation in this paper. The solutions for these shortcomings have been addressed by proposing/protocol an encryption algorithm which has been described in this paper the analysis of the results and details of application execution undertaken will also be presented in future work in this white paper