Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Windows 10 End of Service: What Must Be Done

    19 March 2025

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Vimeo
    Let's Tech It Easy
    Subscribe Login
    • Homepage
    • About
    • Blog
      • Computers
      • Cloud
      • Gaming
      • Cyber Security
      • iPhone
      • Mac
      • Windows
      • Android
    • Contact
    • My Tickets
    • Submit Ticket
    Let's Tech It Easy
    Home»Computers»WIRELESS SECURITY PROTOCOLS
    Computers

    WIRELESS SECURITY PROTOCOLS

    SamikshyaBy Samikshya23 February 2021No Comments5 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Wireless networks are becoming more common in businesses and homes. Most mobile devices now come with a wireless network associated with the device’s brand or carrier. There are also public hotspots at restaurants, coffee shops, and airports to name a few. This makes it easier for us to catch up on work or with friends online.

    However, no matter how convenient wireless networks might be they can present a security risk. Data can be stolen resulting in penalties. Here are some of the risks organizations and individuals need to be aware of.

    In this blog we will describe about the security protocols for Wireless Networks:

    WEP: WEP was developed by the Wi-Fi Alliance in the late 1990s. It was the first encryption algorithm developed for the 802.11 standard, and it had one primary goal – to prevent hackers from accessing any data that was transmitted. Unfortunately, by 2001, cybersecurity experts had found several flaws in the algorithm’s security.

    This led to cybersecurity experts recommending that consumers and organizations phase out WEP from their devices. In 2009, it became apparent that WEP was not as effective as developers had stated when the massive cyberattack against TJ. Maxx was launched. The data breached comprised customers’ credit card accounts and cost the retailer $9.75 million in legal expenses.

    To authenticate users, WEP uses the Rivest Cipher 4 (RC4). The original model used a 40-bit encryption key, though it has been upgraded to a 104-bit key that is manually entered by the administrator. The key is used with a 24-bit IV (Initialization Vector) that helps to strengthen the password/encryption. The problem that often occurs is that due to the IV’s small size, administrators are likely to use the same keys. This makes the encryption easier to hack.

    WEP might have been the original algorithm for wireless networks, but over time it has shown that it is vulnerable to cyber attacks. This is why other security protocols have been developed since the issues with WEP were discovered.

    Wi-Fi Protected Access (WPA)

    Once the flaws were discovered, and made public, in WEP the process to create a new wireless protocol was started. However, it takes time to write a replacement. To ensure that wireless network users still had protection, the Wi-Fi Alliance released WPA as a temporary replacement in 2003. This gave the Institute of Electrical and Electronics Engineers Inc. (IEEE) time to create a viable replacement for WEP.

    Even though WPA is considered an interim security algorithm, it is an improvement over WEP. It has discrete modes for personal and business use for improved security. In personal mode, preshared keys are used to make it easier to implement and manage the network among employees and consumers. Business or enterprise mode requires an administrator to authenticate a device before it can access the network. This allows larger companies to have more control over who has access to the data.

    WPA is based on the RC4 cipher like its predecessor WEP, only it uses TKIP (temporal key integrity protocol) to boost wireless security. This includes,

    • Using 256-bit keys to reduce keys being reused
    • Generating a unique key for a packet by key mixing per packet
    • Automatically broadcasting updated keys and usage
    • Integrity checks of the system
    •  IV size increased to 48 bits

    Since WPA was designed to be compatible with WEP, IT professionals found that they could easily update to the interim security protocol for their wireless network. All they needed was a simple firmware update. While switching protocols was simple this also created potential security risks since it was not as comprehensive as developers and users hoped it would be.

    Wi-Fi Protected Access 2 (WPA2)

    The replacement for the interim WPA, the IEEE released WPA2 in 2004. There are still some security vulnerabilities with WPA2, but it is still considered one of the most secure wireless network protocols available for personal and business use.

    While like WPA, it also offers users personal and enterprise/business modes. WPA2 also has several security improvements. These include,

    • Replacing TKIP and the RC4 cipher with stronger authentication and encryption mechanisms – CCMP (Cipher Block Chaining Message Authentication Code Protocol) and AES (Advanced Encryption Standard). If your device cannot support CCMP, the security algorithm is still compatible with TKIP. This helps to ensure that WPA2 is compatible with all devices and wireless networks.
    •  AES was originally developed by the United States government to protect classified data from foreign and domestic hackers. It uses three symmetric block ciphers with each one encrypting and decrypting incoming and outgoing data using 128, 192, and 256-bit keys. This security protocol for wireless networks does use more power but technical improvements have lessened any concerns about performance.
    • CCMP prevents everyone except for authorized users to receive data by using cipher block chaining. This helps to ensure the integrity of the message.

    WPA2 also allows for more seamless roaming from one access point to another without having to re-authenticate user access. This can improve productivity and client relations. Data can be transferred seamlessly, without having to take extra authentication steps.

    After reviewing the three security protocols for wireless networks, WPA2 is a welcome replacement for WEP and the temporary algorithm WPA. Knowing which protocol provides the best wireless security is helpful, but so is knowing exactly how it works. If you know how threats are being blocked, you’ll be better equipped at recognizing any issues that might get through.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
    Previous ArticleWireless Network Protocols
    Next Article How does VPN works?
    Samikshya

    Related Posts

    Windows 10 End of Service: What Must Be Done

    19 March 2025

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025

    Accessing a Windows External Hard Drive on Mac

    26 February 2025
    Leave A Reply Cancel Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

    Demo
    Our Picks
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Business

    Windows 10 End of Service: What Must Be Done

    By Uneeb19 March 20250

    On October 14, 2025, Microsoft will officially end support for Windows 10, signalling a major shift…

    Elementor #7217

    5 March 2025

    Why Windows is Still the Best for Gamers: A Deep Dive

    27 February 2025

    Accessing a Windows External Hard Drive on Mac

    26 February 2025

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    You too can join us

    If you also think about technology and want to contribute either as a mentor or even from a learner’s perspective, look no further and join us. Write us at [email protected] and share your opinion. Our team will get back by sending you an invite to join the platform as a contributor. Empower others, empower yourself so each one of us can play with the technology safely one day without being scared.

    Subscribe Here
    Loading
    For Partnership Worldwide

    Contact:

    [email protected]

     

    About Us
    About Us

    “Let’s Tech It Easy” or popularly known as “LTIE” is the blogging platform for everyone who wants to share and learn about technology. It is an initiative by the serial techpreneur Vish when he realized the wide gap between the pace at which the technology is evolving and at which it is getting adopted by a wider audience.

    Email Us: [email protected]

    Latest Posts

    Upgrading RAM

    10 March 2023

    Desktop Vs Laptop

    10 March 2023

    Data Recovery

    3 March 2023

    MacOS on Windows Virtual Box

    10 February 2023

    macOS Monterey and what’s new in it?

    12 April 2022
    New Comments
    • How to Troubleshoot Sound and Mic on Windows 10 - Let's Tech It Easy on How to Access Troubleshooters on Windows 10
    • How to Stay Safe While Using Public Wi-Fi Networks - Let's Tech It Easy on Internet Security for Home Users – VPN 101
    • How to Set up Oracle VirtualBox on a Mac - Let's Tech It Easy on How to Install Windows 10 on a Mac Using Boot Camp Assistant
    • DoS Attack Implementation and Prevention in Ubuntu – Let's Tech It Easy on Top Kali Linux Commands
    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About
    • Blog
    • Contact
    • Computers
    • Cloud
    • Gaming
    • Cyber Security
    • iPhone
    • Mac
    • Windows
    • My Tickets
    • Submit Ticket
    © 2025 LetsTechitEasy. Designed by Sukrit Infotech.

    Type above and press Enter to search. Press Esc to cancel.

    Sign In or Register

    Welcome Back!

    Login below or Register Now.

    Lost password?

    Register Now!

    Already registered? Login.

    A password will be e-mailed to you.