An analyzing process on wireless protection criteria focusing on (WPA) within computer network security

Authors

  • Mustafa Raheem Neamah
  • Hasanian Ali Thuwaib
  • Baraa I. Farhan

DOI:

https://doi.org/10.21533/pen.v9.i1.728

Abstract

Network security from a long ago approaches to cryptography and hash functions which are tremendous and due to the weakness of different vulnerabilities in the networks and obviously there is a significant need for analyzes. In this manuscript, the state-of-the-art wireless environment is focused solely on the sensor technology, in which security needs to be integrated with the Wireless Protected Access (WPA) standards. Wireless networking includes numerous points of view from wireless sensor systems, ad hoc mobile devices, Wi-Max and many more. The authentication and dynamic encryption is modified by system managers so that general communication can be anchored without any sniper effort in order to perform higher degrees of security and overall execution. The key exchange mechanism in wireless systems such as forward cases is accompanied by the sophisticated cryptography so as to anchor the whole computer state. The manuscript carries out a significant audit of test points of view using the methodologies used for the cryptography angle for protection and honesty in the wireless case, stressing Wi-Fi Secure Protected (WPA) needs.

Downloads

Published

2021-02-28

Issue

Section

Articles

How to Cite

An analyzing process on wireless protection criteria focusing on (WPA) within computer network security. (2021). Periodicals of Engineering and Natural Sciences, 9(1), 242-252. https://doi.org/10.21533/pen.v9.i1.728