Ovislink OV804WV User Manual page 157

Table of Contents

Advertisement

WPA2-PSK. In the following, some authentications are
introduced.
WEP is short for wired equivalent privacy (or wireless
encryption protocol), WEP is part of the IEEE 802.11 wireless
networking standard and was designed to provide the same
level of security as that of a wired LAN. Because wireless
networks broadcast messages using radio, they are
susceptible to eavesdropping. WEP provides security by
encrypting data over radio waves so that it is protected as it is
transmitted from one end point to another.
WEP is the encryption scheme considered to be the initial
standard for first generation wireless networking devices.
However, it has been found that WEP is not as secure as once
believed. WEP is used at the two lowest layers of the OSI
model-the data link and physical layers; it therefore does not
offer end-to-end security.
WEP's major weakness is its use of static encryption keys.
When you set up a router with a WEP encryption key, that one
key is used by every device on your network to encrypt every
packet that is transmitted. But the fact that packets are
encrypted does not prevent them from being intercepted, and
due to some esoteric technical flaws it is entirely possible for
an eavesdropper to intercept enough WEP-encrypted packets
to eventually deduce what the key is.
WPA is short for Wi-Fi Protected access. It debuted to
address many of WEP's shortcomings. It includes two
improvements over WEP:
Improved data encryption through the temporal key
integrity protocol (TKIP). TKIP scrambles the keys
using a hashing algorithm and, by adding an
integrity-checking feature, ensures that the keys
have not been tampered with.
User authentication, which is generally missing in
WEP, through the extensible authentication protocol
(EAP). WEP regulates access to a wireless network
153

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents