ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Understanding WPA, WEP, and WAP for Wi-Fi Security

Verified

Added on  2023/06/15

|3
|693
|256
AI Summary
This article explains the protocols of WPA, WEP, and WAP for Wi-Fi security. It covers their pros, cons, and issues related to battery life, processing speed, limited availability, and more. It also discusses the 4-way handshake for authenticating the client access point and establishing and installing the TKIP encryption keys.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Slide 2: The protocols of WPA are based on security certification which are mainly to secure the
wireless computer networks. It has been highly effective to handle the stronger encryption
through the use of technologies like Temporal Key Integrity Protocol and Advanced Encryption
Standards. They also include the built-in authentication support that WEP (Wired Equivalent
Privacy) does not offer.
Slide 3:
WPA: It is the security technology for the proper improvement of authentication and encryption
features. It is based on authentication support with allowing the clients to connect to the network.
It works mainly through the proper access with RADIUS (Remote Authentication Dial in User
Service) which is important for a proper encrypted connection for home and other network areas.
The pros are that it is able to handle the authenticated users with support on pre-WPA devices
like WEP. The cons are that it is vulnerable to the attacks even when the protocol is found to be
secured than WEP.
Slide 4: WPA works on the computation and authorisation of computers that can use methods to
verify the computer identity. It focuses on central authentication server with allowing the server
and the clients to implement the WPA and access points that can operate in both WEP and WPA.
They are mainly working with unauthorised access to enterprise wireless network with invasion
of attack vector of certain access points.
Slide 5: It works with the SOHO authentication, where there is entering of the passwords into
AP and the clients. After this, the password is checked and then the network is established. With
this, there are keys derived and installed where the client and AP are able to handle the exchange
of encrypted data.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Slide 6: There are different communication with WAP enabled phone that are for setting a
proper track from the handset. They are used in the corporate applications with better online
services in banking, electronic commerce where the subscribers can use their handset just to
work with the purchase of products. There is a major possibility which includes a micro browser
that defines the user interface that contains the WML and Wireless Telephony Application.
Slide 7: It has been effective to the mobile network with better communication capabilities and
easy to carry feature. WAP works on the time saving factor where the people generally use it for
the personal methods and for easy usage of devices. It is mainly device specific for the handling
of user credentials.
Slide 8: The issues are related to the battery life with the processing of the speed access that has
a limited availability that includes the price, lack of the user habit. It includes the limited
memory and limited bandwidth that includes the transaction support and making sure that focus
on the issues related to the privacy, authentication and data integration.
Slide 9: The WEP is mainly for handling the weak authentication where the static master key is
entered manually into every device. WPA is for addressing the retaining and using of 256 bits
which are for the stronger authentication enterprise mode. The WPA2 is for the replacement with
AES algorithm that has a stronger authentication capability.
Slide 10: WPA next generation of Wi-Fi security is mainly for handling the IEEE 802.11
standard where the AES is going to be used with the Cipher Block Chaining Message
Authentication Code Protocol (CCMP). It will then tend to generate the message with integrity
of data. The standards are set with the integrity of data and matching the stronger encryption to
create unique session keys.
Document Page
Slide 11: WAP works on authentication and key distribution with home users and small
business. The 4-way handshake helps in authenticating the client access point, establishing and
installing the TKIP encryption keys. It also provides a stronger sense of wireless security with
adding the authentication to WEP basic encryption.
1 out of 3
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]