Nabeel AhmedRashid Hafeez2026-02-102026-02-102007https://escholar.umt.edu.pk/handle/123456789/19598Wired technology has been replaced by wireless. We cannot stop this flow of change in technology. The need for securing wireless has also increased and this is a major issue of current era. Security is much much important because it saves: 1) Confidential data 2) Passwords 3) First mover advantage for the company 4) Army confidential messages 5) Confidential GOVT messages 6) Internet personal messages These are very important because, for example if someone steels someone’s serial number of ATM card which is its password then he can easily withdraw money with bad intentions. As far wired technology was concerned security was not a big problem because data use to flow through a guided medium. However where in wireless communication signals flows throughout the air. If someone within the range resonate the frequency of this signal then he can easily scan the sent message. This is prevented by using proper encryption techniques such as stream ciphers and block ciphers. WEP algo that is RC4 algo was also used but was not as beneficial as ciphers. The initialization vector (IV) is more advanced and beneficial. However attacks on them can occur to predict actual keys before the encryption. Such attacks may include statistical key derivation, inductive key derivation, Replay attacks and Bit-flipping attacks. These attacks can be overcome by dynamic key management. The most beneficial work don in this record is by the virtue of Cisco. Cisco provide as follows: 1) Message integrity check 2) Per packet keying 3) Broadcast key rotation In this regard the most beneficial standards used by Cisco is 802.11x which provides extensive authentication protocol. 802.11 support TKIP, per packet keying, broadcast key rotation and Cisco LEAP. Broadcast key rotation helps dynamic purposes TKIP provides a strong authentication method and LEAP is easier to deploy. LEAP also uses strong authentication passwords. However security can be enhanced in terms of its encryption through advanced encryption standards. It contains OCB and cipher block. There is also CCM included in it. These are all encryption techniques. Protected EAP is also included in AES it uses generic token card and EAP MD5 for passwords based authentication. However wireless field is like an enlit object which radiates in all directions and it is difficult which renders to a challenge of securing wireless LAN altogether. Never the less researches are being made to overcome this challenge but hackers are also advancing themselves day by day.enDesign and implementation Of wireless lan security systemThesis