Complete resolution of Wireless Access Network Encryption Problems

Source: Internet
Author: User

Wireless Access networks are currently a very popular access technology. Many people may not know about encryption in Wireless Access networks. It does not matter. After reading this article, you will certainly have a lot of GAINS, I hope this article will teach you more things. You certainly won't design an Internet access network without a firewall. Therefore, how do you set up an unencrypted Wireless Access Network? Understanding wireless access network encryption is very important for deploying a secure wireless access network.

The security of wireless access network transmission is similar to a written information. There are various ways to send a written message. Each method provides an enhanced level of security and protects the integrity of this information. You can send a postcard so that this information is made public to everyone who sees it. You can put this information in an envelope to prevent anyone from seeing it at will. If you want to ensure that only the recipient can see this information, you need to encrypt this information and ensure that the recipient knows the decoding method of this information.

This is also true for wireless data transmission. Unencrypted wireless data is transmitted in the air and may be intercepted by any nearby wireless access network device. Using the Wired Equivalent protocol (WEP) to encrypt your wireless access network provides minimum security, because this encryption is very easy to crack. If you want to protect your wireless data, you need to use more secure encryption methods such as WPA (Wi-Fi protection access. To help you understand these options, we will briefly introduce some existing wireless encryption and security technologies:

Wired Equivalent protocol (WEP)

Wired Equivalent protocol is a type of encryption that manufacturers rush to launch as a pseudo standard. The vendor must rush to produce wireless devices before the Protocol standards are finalized. Therefore, this Protocol later found some vulnerabilities. Even an initial attacker can exploit this Protocol's security vulnerability.

Wi-Fi protection access (WPA)

The Wi-Fi protection access protocol is developed to improve or replace vulnerable WEP encryption methods. WPA provides more powerful encryption methods than WEP, solving many weaknesses in WEP.

Temporary Key Integrity Protocol (TKIP)

TKIP is a basic technology that allows WPA to be backward compatible with the WEP protocol and existing wireless hardware. TKIP and WEP work together to form a longer 128-bit key and change the key based on each packet, making the key much safer than using the WEP protocol separately.

Scalable authentication protocol (EAP)

With the support of EAP, WPA encryption provides more functions related to controlling access to wireless access networks. The method is not only to control access to wireless networks based on captured or fake mac addresses, but to control access to wireless access networks based on public key infrastructure (PKI.

Although the WPA protocol has greatly improved the WEP protocol, it is much more secure than the WEP protocol, but any encryption is much better than nothing. If WEP is the only protection on your wireless device, this protection can still prevent unauthorized wireless data and allow most new attackers to seek unprotected wireless access networks.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.