Wirless Security Protocols (Wi-Fi Protected Access II (WPA2) (WPA2 (also…
Wirless Security Protocols
Wired Equivalent Privacy (WEP)
The original security protocol used to secure wireless networks
Its aim to provide same security as wire netwoek
Unfortunately, it has significant vulnerabilities
the IEEE deprecated the use of WEP in 2004
Wi-Fi Protected Access (WPA)
A replacement to WEP until developer done with WPA2
immediate solution to the weaknesses of WEP without requiring users to upgrade their hardware.
Wi-Fi Protected Access II (WPA2)
WPA2 (also known as IEEE 802.11i)
Permanent replacement for WEP and WPA
Uses stronger cryptography than both WEP and WPA.
The Wi-Fi Alliance requires all devices carrying its WI-FI CERTIFIED logo to meet WPA2 standards, .
including the use of the Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)
Cipher Block Chaining Message Authentication Code Protocol (CCMP)
newer encryption protocol used with WPA2.
recommends using WPA2 with CCMP because it provides significantly more security.
Based on Advanced Encryption Standard AES
Temporal Key Integrity Protocol (TKIP)
An older encryption protocol used with WPA
IEEE has deprecated TKIP
Even though TKIP corrects several of WEP’s flaws, it was ultimately cracked.
Doesn't required hardware upgrade
Several people have been successful at cracking WPA with TKIP, so whenever possible, it’s best to upgrade WPA to WPA2, or at least upgrade TKIP to use AES.
An 802.1x server is integrated with a database of accounts and it provides port-based authentication by requiring users and devices to authenticate before granting them access to a network.
IEEE 802.1x as a Remote Authentication Dial-In User Service (RADIUS) server
When implemented with WPA or WPA2, 802.1x provides an added layer of protection by ensuring users can authenticate before granting them access to the wireless network.
RADIUS provides centralized authentication
Advanced Encryption Standard (AES)
it is a very strong and efficient encryption algorithm.
Used instead of TKIP
Many applications beyond WPA/WPA2 use AES to provide secure encryption and ensure confidentiality.