Network security mechanisms all have their own protocol standards, just as our society has its own laws and regulations to ensure social stability. WLAN security standards for wireless networks are the main content of this article. I have learned about WLAN security standards for wireless networks and hope to help you.
There are roughly three WLAN security standards for wireless networks: WEP, WPA, and WAPI.
WLAN security standard for wireless networks 1: WEP
WEP (WiredEquivalentPrivacy) is a security standard used by 802.11b to provide an encryption mechanism to protect the security of the data link layer, so that the data transmission security of WLAN in wireless networks reaches the same level as that of wired LAN. WEP adopts the RC4 algorithm to implement symmetric encryption. You can use a preset shared key between the AP and the wireless network card. During communication, the WEP standard requires the transmitter to create an initialization vector (IV) specific to the data packet and combine it with the preset key to generate an encryption key for data packet encryption. The receiver receives this initialization vector and combines it with the local preset key to restore the encryption key.
WEP allows 40-bit long keys, which is too short for most applications. At the same time, WEP does not support automatic replacement of keys. All keys must be manually reset, which leads to long-term reuse of the same key. Third, although the initialization vector is used, the initialization vector is transmitted in plaintext and can be reused within five hours, which does not affect the strength of the key. In addition, the RC4 algorithm used in WEP has been proved to be vulnerable. In summary, the limitations of key settings and the shortcomings of algorithms make WEP have obvious security defects. The security protection effect provided by WEP can only be defined as "better than nothing ".
WLAN security standard for wireless networks 2: WPA
WPA (Wi-FiProtectedAccess) is a device that protects the security of Wi-Fi login. It is divided into two versions: WPA and WPA2. It is an upgraded version of WEP and makes up for the shortcomings of WEP. Is an integral part of 802.11i. It is a temporary alternative to 802.11i before it is complete.
Unlike WEP, WPA provides both encryption and authentication. It ensures the security of the data link layer and only authorized users can access wireless network WLAN. WPA uses the TKIP protocol (TemporalKeyIntegrityProtocol) as the encryption protocol, which provides a key reset mechanism and enhances the effective length of the key. Through these methods, the WEP protocol is insufficient. Two authentication methods are available: one is 802.11x protocol and the other is preset key PSK.
WLAN security standard for wireless networks 3: WAPI
WAPI (Wireless Network WLANAuthenticationandPrivacyInfrastructure) is a wireless network WLAN security standard developed and vigorously implemented by China. It has passed IEEE (note, not Wi-Fi) authentication and authorization, it is an authentication and Privacy Protection Protocol. Its function is similar to WEP in 802.11b, but it can provide more comprehensive security protection. WAPI implements Security Protection by combining asymmetric (Elliptic Curve Cryptography) and symmetric cryptography (group cryptography, it implements device identity authentication, link verification, access control, and encryption and Protection of user information during wireless transmission.
In addition to mutual authentication between mobile terminals and AP, WAPI can also authenticate mobile terminals and AP through mobile networks. At the same time, the verification of the AP and mobile terminal certificates is handed over to the AS. On the one hand, the power consumption of the MT and AP is reduced, and on the other hand, the Public Key Certificate issued by the MT and AP is provided for the use of different issuers.