Introduction to three WLAN security standards

Source: Internet
Author: User

Network security mechanisms all have their own protocol standards, just as our society has its own laws and regulations to ensure social stability. WLAN security standards for wireless networks are the main content of this article. I have learned about WLAN security standards for wireless networks and hope to help you.

There are roughly three WLAN security standards for wireless networks: WEP, WPA, and WAPI.

WLAN security standard for wireless networks 1: WEP

WEP (WiredEquivalentPrivacy) is a security standard used by 802.11b to provide an encryption mechanism to protect the security of the data link layer, so that the data transmission security of WLAN in wireless networks reaches the same level as that of wired LAN. WEP adopts the RC4 algorithm to implement symmetric encryption. You can use a preset shared key between the AP and the wireless network card. During communication, the WEP standard requires the transmitter to create an initialization vector (IV) specific to the data packet and combine it with the preset key to generate an encryption key for data packet encryption. The receiver receives this initialization vector and combines it with the local preset key to restore the encryption key.

WEP allows 40-bit long keys, which is too short for most applications. At the same time, WEP does not support automatic replacement of keys. All keys must be manually reset, which leads to long-term reuse of the same key. Third, although the initialization vector is used, the initialization vector is transmitted in plaintext and can be reused within five hours, which does not affect the strength of the key. In addition, the RC4 algorithm used in WEP has been proved to be vulnerable. In summary, the limitations of key settings and the shortcomings of algorithms make WEP have obvious security defects. The security protection effect provided by WEP can only be defined as "better than nothing ".

WLAN security standard for wireless networks 2: WPA

WPA (Wi-FiProtectedAccess) is a device that protects the security of Wi-Fi login. It is divided into two versions: WPA and WPA2. It is an upgraded version of WEP and makes up for the shortcomings of WEP. Is an integral part of 802.11i. It is a temporary alternative to 802.11i before it is complete.

Unlike WEP, WPA provides both encryption and authentication. It ensures the security of the data link layer and only authorized users can access wireless network WLAN. WPA uses the TKIP protocol (TemporalKeyIntegrityProtocol) as the encryption protocol, which provides a key reset mechanism and enhances the effective length of the key. Through these methods, the WEP protocol is insufficient. Two authentication methods are available: one is 802.11x protocol and the other is preset key PSK.

WLAN security standard for wireless networks 3: WAPI

WAPI (Wireless Network WLANAuthenticationandPrivacyInfrastructure) is a wireless network WLAN security standard developed and vigorously implemented by China. It has passed IEEE (note, not Wi-Fi) authentication and authorization, it is an authentication and Privacy Protection Protocol. Its function is similar to WEP in 802.11b, but it can provide more comprehensive security protection. WAPI implements Security Protection by combining asymmetric (Elliptic Curve Cryptography) and symmetric cryptography (group cryptography, it implements device identity authentication, link verification, access control, and encryption and Protection of user information during wireless transmission.

In addition to mutual authentication between mobile terminals and AP, WAPI can also authenticate mobile terminals and AP through mobile networks. At the same time, the verification of the AP and mobile terminal certificates is handed over to the AS. On the one hand, the power consumption of the MT and AP is reduced, and on the other hand, the Public Key Certificate issued by the MT and AP is provided for the use of different issuers.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.