WEP, WPA, WPA2 and WPA3 wireless security protocols

This is survey research project for exploring the technical side of all WPA technology. It is a thorough description of each type and their application, their drawbacks from a deep technical stance and proposing a solution that will address the problems of the older models of WPA with WPA3 being the solution to all the problems. The entire report should be written from a technical and expert point of view and not general references and term but dive deep into the explanations and descriptions.
You need to explain the features and the attacks against these protocols in your research paper

WEP
WPA
WPA2
WPA3

Project Survey
1. Abstract.

2. Introduction
    Discuss the background and motivation of your work. (What inspired the writing of this document, raising awareness with indepth knowledge)
    Summarize the research problem. (All WPAs of all types are prone to attacks, dont mention WPA3 which only be mentioned in section 6 as the solution to all problems)
    Summarize the proposed solution/approach to the problem. (Describe how WPA3 is fixing issues from other WPAs how this technology can be implemented on a corporate and global scale)

3. Problem statement
    what is the problem, why it is important to solve it -motivation-, what are the related security challenges/issues and how they are related to the studied topic?

4. Requirements
    Identify and present what the requirements should the solution fulfill
o    which functionalities it provides; i.e. characteristics of each WPA and their application of use for different scenarios 
o    What properties the system should have to differentiate each one from the other 

5. State-of-the-Art (should be different from background)
    Discuss research previously written by other writers related to problem described in section 3
    Classify, organize/categorize the different solutions
    Compare and show advantages and disadvantages of their findings
o    Analyze the solutions using the requirements: which requirements do they meet and which ones they dont from a security perspective on a personal, corporate and global level for each of the points mentions in section 5

6. Research challenges
If you want to design a system that solves the problem you described and meet all the requirements you identified, what will be the challenges that you have to solve? The optimum solution is WPA3
    Identify the challenges (open issues) related to the solution
    Categorize these challenges
    Give a detailed description of each challenge: explain what is the challenge, why it is difficult to solve, etc.

7. Roadmap and hints
    in which order may the challenges be addressed (search for known security flaws in the WPA3 and how are the negative effects e.g. 1)WPA is not backwards compatible from what I understand. WPA3 is it’s own new standard and any client device you have needs to be upgraded to also support WPA3, 2)The researchers found that even with WPA3, an attacker within range of a victim can still recover the password to the Wi-Fi network.
)
    give hints about how to solve each (most) of the identified issues

8. Conclusions
    Summarize the conclusions of your work. Future work is optional.

9. References
    List all the citations referenced in your paper minimum of 20-30. You will lose 1 points for each missing or dangling reference (i.e., the reference not cited in the main text).
    Use IEEE format, and present the references in order [1], then [2], etc.;
o    The first reference to be referenced in the paper is [1], the second to be referenced is [2], etc.
o    Total of exactly 12 references are required for this is report

o Format, respect of outline, quality of English
o The paper should have single spaced line with the font size 11 Times New Roman.

———————————————————————————————————————————

NOTE: paper structure, presentation, and writing style will be taken into consideration.
    You must use an IEEE format for your paper

Some References

Mobile applications security; i.e. securing the applications running on mobile phones
[1].        D. He, S. Chan and M. Guizani, “Mobile application security: malware threats and defenses,” in IEEE Wireless Communications, vol. 22, no. 1, pp. 138-144, February 2015

——————————————-

Leave a Reply

Your email address will not be published. Required fields are marked *