Abstract— Wireless technology has been gaining rapid
popularity for some years. Adaptation of a standard depends
on the ease of use and level of security it provides. In this case,
contrast between wireless usage and security standards show
that the security is not keeping up with the growth paste of end
user’s usage. Current wireless technologies in use allow
hackers to monitor and even change the integrity of
transmitted data. Lack of rigid security standards has caused
companies to invest millions on securing their wireless
networks. There are three major types of security standards in
wireless. In our previous papers which registered in ICFCC
2009 Malaysia and ICCDA 2009 Singapore [1] [2], we
explained the structure of WEP and WPA as first and second
wireless security protocols and discussed all their versions,
problems and improvements. Now, we try to explain WPA2
versions, problems and enhancements that have done solve the
WPA major weakness. Finally we make a comparison among
WEP and WPA and WPA2 as all wireless security protocols in
Wi-Fi technology. In the next phase we hope that we will
publish a complete comparison among wireless security
techniques by add the WiMax security technique and make a
whole comparison among all security protocols in this area