An analyzing process on wireless protection criteria focusing on (WPA) within computer network security

Mustafa Raheem Neamah, Hasanian Ali Thuwaib, Baraa I. Farhan
2021 Periodicals of Engineering and Natural Sciences (PEN)  
Network security from a long ago approaches to cryptography and hash functions which are tremendous and due to the weakness of different vulnerabilities in the networks and obviously there is a significant need for analyzes. In this manuscript, the state-of-the-art wireless environment is focused solely on the sensor technology, in which security needs to be integrated with the Wireless Protected Access (WPA) standards. Wireless networking includes numerous points of view from wireless sensor
more » ... stems, ad hoc mobile devices, Wi-Max and many more. The authentication and dynamic encryption is modified by system managers so that general communication can be anchored without any sniper effort in order to perform higher degrees of security and overall execution. The key exchange mechanism in wireless systems such as forward cases is accompanied by the sophisticated cryptography so as to anchor the whole computer state. The manuscript carries out a significant audit of test points of view using the methodologies used for the cryptography angle for protection and honesty in the wireless case, stressing Wi-Fi Secure Protected (WPA) needs.
doi:10.21533/pen.v9i1.1796 fatcat:52ryrnhyzvhsjfsaakhqc4i66m