Wireless networks are relatively easier to break into by hackers, and they are also cracked to gain access to the underlying wired networks. It has become very essential for enterprises to define effective wireless security policies that guard against unauthorized access to their sensitive resources. With the increasing use of wireless technology, the risk of users has increased many folds. There are great risks associated with present wireless protocols and encryption methods, which are easier to crack, allowing hackers to gain access and lure clients in disclosing their vital information and resources. It is now very crucial to define new sets of secure protocols and techniques. The wireless access points and clients are easily vulnerable to many types of attacks, where sensitive data and information is stolen. So, the options which remain with the organization are either to patch the existing software or costly hardware upgrade, still certain issues can be resolved with creating new protocols of authentication.