Open Access Open Access  Restricted Access Subscription or Fee Access

A Performance Analysis of WEP and WPA2 Protocols to Ensure WLAN Security

B. Vani, L. Arockiam


Security is the major issue among the WLAN user community since users are comfortable with the mobility and portability of the mobile devices.  The ease of use makes them to concentrate on the minimum security measures like a basic authentication with a periodic change of passwords. On the other side of these technological benefits, there is always a hidden chance of intrusions on the personal and business data.   The data authentication, authorization, data integrity and confidentiality are the most used specifications for securing the wireless network. So the ultimate solution is to protect the data from all types of attack and losses. For this the user must know the types of attacks and the prevention methods. This paper analyzes the two security protocols namely RC4 and AES, which are used in WEP and WPA2 respectively.  The purpose of this paper is to give developers with little or no knowledge of cryptography the ability to understand the encryption and decryption techniques used in RC4, AES algorithms and also a comparative performance analysis methodology.


Authentication, AES, Wireless Security, WEP, WPA, 802.1x.

Full Text:



Alfred Loo, “The Myths and truths of Wireless Security”, Communications of the ACM, Feb’ 2008.

Jeff Dixon, “Wireless Intrusion Detection Systems Including Incident Response & Wireless Policy”, Proceedings of the IEEE, 2003.

Borisov Nikita, Goldberg Ian and Wagner David, “Intercepting mobile communications: the insecurity of 802.11”. International Conference on Mobile Computing and Networking, pp 180-189, July 2001.

Radomir Prodanovi and Dejan Simi, “A survey of wireless security”, Journal of Computing and Information Technology - CIT 15, 2007, 3, pp – 237–255.

Ezedin S. Barka, Emad Eldin Mohamed and Khadhim Hayawi, “End-To- End Security solutions for WLAN: A Performance Analysis for the underlying Encryption Algorithms in the Lightweight Devices”, IWCMC’06, Vancouver,British Columbia, Canada, July 3–6, 2006.

Aaron Sawyer, “A Brief Guide to Securing Wireless Networks: Closing the Back Door”, Infosecwriters forum, 2008.

Stanley Wong, “The evolution of wireless security in 802.11 networks: WEP, WPA and 802.11 standards”, GSEC Practical v1.4b, 2007.

J. Daemen, L.R. Knudsen and V. Rijmen, "The block cipher Square," Fast Software Encryption, LNCS 1267, E. Biham, Ed., Springer-Verlag, 1997, pp. 149-165.

Halil Ibrahim Bulbul, Ihsan Batmaz and Mesut Ozel, “Wireless Network Security : Comparison of WEP (Wired Equivalent Privacy) Mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) Security Protocols”, e- Forensics 2008, January 21-23, 2008.

Adam Stubblefield, John Ioannidis and Aviel D. Rubin, “A Key Recovery Attack on the 802.11b Wired Equivalent Privacy Protocol (WEP)”, ACM Transactions on Information and System Security, May 2004, Pages 319–332.

Stephen Michell and kannan Srinivasan, “ State based key Hop Protocol: A Light weight security Protocol for wireless networks”, PE-WASAN’04, ACM, 2004.

Hani Ragab Hassan, Yacine Challal, “Enhanced WEP: An efficient solution to WEP threats”, IEEE 2005.

Arash Habibi Lashkari, Masood Mansoori, Amir Seyed Danesh; “Wired Equivalent Privacy(WEP) versus Wi-fi Protected Access”, ICCDA Singapore Conference, 2009.

Arash Habibi Lashkari Fcsit, Mir Mohammad Seyed Danesh Behrang Samadi, “A Survey on Wireless Security protocols (WEP, WPA and WPA2/802.11i)”, IEEE, 2009.

Nancy Cam-Winget, Russ Housley, David Wagner and Jesse Walker, “Security flaws in 802.11 data link Protocols”, Communications of the ACM, Vol.46, No.5, May 2003.

Yasir Zahur and T. Andrew Yang, “Wireless Lan Security And Laboratory Designs”, Consortium for Computing Sciences in Colleges (CCSC), 2003.

Jihwang Yeo, Moustafa Youssef, Ashok Agrawala, “A Framework for Wireless LAN Monitoring and Its Applications”, ACM, 2004.

Rupinder Gill, Jason Smith and Andrew Clark, ”Experiences in Passively Detecting Session Hijacking Attacks in IEEE 802.11 Networks”, Australian Computer Society, 2006.

S. Fluhrer, I. Mantin and A. Shamir, “Weakness in the Key scheduling algorithm of RC4”, In lecture notes in comouter science, 2259, 2001.

J. Walker, “802.11 security series – part II: The Temporal Key Integrity Protocol (TKIP), Intel Corporation, 2002.

Daemen. J, Rijmen. V, “ Rijndael: The Advanced Encryption Standard”, Dr. Dobb’s journal, March 2001, PP. 137-139

S.Z.S. Idrus, S.A. Aljunind, S.M. Asi, “ Performance Analysis of Encryption algorithms Text length size on web browsers”, IJCSNS International Journal of Computer Science and Network Security, Vol.8 No.1, 2008, PP 20-25.

A.A. Tamimi, “Performance analysis of Data Encryption Algorithms”,2008. (

M. Bernaschi , F. Ferreri , L. Valcamonici, “Access points Vulnerabilities to DoS attacks in 802.11 networks, Springer Science+Business Media, LLC,2006.

Ruangchaijatupon, P. Krishnamoorthy, “Encryption and Power Consumption in Wireless Lans”, The third IEEE Workshop on Wireless LANs, 2001.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.