and subsequently a key combination is integrated and flexible authorization policies with secured access can be deployed to restrict users. 3) Availability which is also an important measure in data security, the network should be able to
stop attackers form shutting down or manipulating the connectivity of the entire system on the network, if this is
done appropriately it could prevent denial of service attack DoS or it can mitigate it. The WiFi Protected Access
(WPA), also utilizes the RC4 for data encryption in a wireless network, but it also adopts a Temporal Key Integrity
Protocol (TKIP) for its confidentiality. In detecting replay packets or messages in WPA, a sequence mechanism
is used to increase the sequence number of each message or packet [4] [5]. The WPA improved authentication
methods are Pre-Shared Key (PSK), which authenticates the connected users with a 128-bit encryption
key and a distinct 64-bit Message Integrity Code (MIC) which is gotten from the PSK. Also, the IEEE 802.1X
and the Extensible Authentication Protocol (EAP) which can be provide a stronger authentication [4]-[6]. The
IEEE 802.11i provides an improved MAC layer security, provides authentication protocols, key management
protocols, and data confidentiality protocols. Another technique is the use of a Closed System Authentication
which hides the SSID broadcast [4]-[6]. This only gives access to users who know the SSID of the network to gain
access to the network and join. Other methods to secure a WLAN outside the MAC layer such approach