IntroductionWireless network technology is the fastest growing sector of the communications market. An organization is adopting wireless networking technologies to meet ever-increasing networking requirements (Whitman, ME & Mattord, HJ 2005). Wireless networks have proven their ability to provide greater productivity, convenience and freedom of movement for users and network deployment flexibility for organizations' IT staff. Thanks to wireless networks, computer users have become more mobile. Users do not need to be close to the connection point to use the Internet (Solms, BV & Marais, E 2004). However, wireless technology also generates new threats and alters the existing risk profile for information security. It is essential to protect a wireless network if we want to prevent unauthorized users from accessing our data and downloading materials. Nowadays, theft of data and resources via the Internet has become very frequent. Therefore, it is important to secure your wireless network using little time to save in the future. Wireless network security becomes more and more vital as it is more commonly used in every field. Numerous practices have been developed to date to secure wireless networks, and given the scope and importance, more research is being conducted for more secure wireless networks in the future ( Solms, BV & Marais, E 2004). Wireless network security1. Basics of Wireless NetworksSecond (Vacca, JR 2006) The term wireless network refers to the technology that facilitates the communication of two or more computers using standard network protocols, but without network cabling. It wasn't long ago that computers were a luxury rather than a necessity. Having compu...... middle of paper......network servers are managed by KDC.4.5 PEAP, LEAP and EAPPEAP are developed by RSA Security, Cisco and Microsoft. PEAP allows secure data transfer, transport of encryption keys and passwords without involving the server certificate. PEAP is designed to secure EAP communication between clients and authenticators. LEAP is the lightweight extensible authentication protocol. It is based on 802.1X and uses WEP and a sensitive key management system to reduce the original security flaws. LEAP is very safe unlike EAP-MD5 and is prone to cracking. There are some crackers to break LEAP such as THC-Leap, Anwrap and Asleared cracker (Rittinghouse, JW & Ransome, JF 2004). LEAP presented a cost-effective way to ensure mutual authentication between a RADIUS client and server when authentication standards for use in wireless environments were still rapidly evolving
tags