specifically, it analyzes the impact of different implementations of encryption techniques
used by two security protocols, namely Wired Equivalent Privacy (WEP) and Wi-Fi Protected
Access (WPA) on the throughput over WLAN IEEE 802.11 g. This paper also addresses the
different issues related to the security protocols currently used in WLAN IEEE 802.11 g and
demonstrates how these issues affect the final results of the experiments conducted. The …