Understanding WPA, WEP, and WAP for Wi-Fi Security
Verified
Added on 2023/06/15
|3
|693
|256
AI Summary
This article explains the protocols of WPA, WEP, and WAP for Wi-Fi security. It covers their pros, cons, and issues related to battery life, processing speed, limited availability, and more. It also discusses the 4-way handshake for authenticating the client access point and establishing and installing the TKIP encryption keys.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Slide 2:The protocols of WPA are based on security certification which are mainly to secure the wireless computer networks. It has been highly effective to handle the stronger encryption through the use of technologies like Temporal Key Integrity Protocol and Advanced Encryption Standards. They also include the built-in authentication support that WEP (Wired Equivalent Privacy) does not offer. Slide 3: WPA: It is the security technology for the proper improvement of authentication and encryption features. It is based on authentication support with allowing the clients to connect to the network. It works mainly through the proper access with RADIUS (Remote Authentication Dial in User Service) which is important for a proper encrypted connection for home and other network areas. The pros are that it is able to handle the authenticated users with support on pre-WPA devices like WEP. The cons are that it is vulnerable to the attacks even when the protocol is found to be secured than WEP. Slide 4:WPA works on the computation and authorisation of computers that can use methods to verify the computer identity. It focuses on central authentication server with allowing the server and the clients to implement the WPA and access points that can operate in both WEP and WPA. They are mainly working with unauthorised access to enterprise wireless network with invasion of attack vector of certain access points. Slide 5:It works with the SOHO authentication, where there is entering of the passwords into AP and the clients. After this, the password is checked and then the network is established. With this, there are keys derived and installed where the client and AP are able to handle the exchange of encrypted data.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Slide 6:There are different communication with WAP enabled phone that are for setting a proper track from the handset. They are used in the corporate applications with better online services in banking, electronic commerce where the subscribers can use their handset just to work with the purchase of products. There is a major possibility which includes a micro browser that defines the user interface that contains the WML and Wireless Telephony Application. Slide 7:It has been effective to the mobile network with better communication capabilities and easy to carry feature. WAP works on the time saving factor where the people generally use it for the personal methods and for easy usage of devices. It is mainly device specific for the handling of user credentials. Slide 8:The issues are related to the battery life with the processing of the speed access that has a limited availability that includes the price, lack of the user habit. It includes the limited memory and limited bandwidth that includes the transaction support and making sure that focus on the issues related to the privacy, authentication and data integration. Slide 9:The WEP is mainly for handling the weak authentication where the static master key is entered manually into every device. WPA is for addressing the retaining and using of 256 bits which are for the stronger authentication enterprise mode. The WPA2 is for the replacement with AES algorithm that has a stronger authentication capability. Slide 10:WPA next generation of Wi-Fi security is mainly for handling the IEEE 802.11 standard where the AES is going to be used with the Cipher Block Chaining Message Authentication Code Protocol (CCMP). It will then tend to generate the message with integrity of data. The standards are set with the integrity of data and matching the stronger encryption to create unique session keys.
Slide 11:WAP works on authentication and key distribution with home users and small business. The 4-way handshake helps in authenticating the client access point, establishing and installing the TKIP encryption keys. It also provides a stronger sense of wireless security with adding the authentication to WEP basic encryption.