How to select Wireless Encryption in wireless networks

Source: Internet
Author: User

You don't design a network with internet access and no firewall. So why do you have a wireless network without encryption? Understanding wireless encryption is important for deploying a secure wireless network.

The safety of wireless transmissions is analogous to a letter. There are various ways to send letters, and each method improves the security level and protects the integrity of the information. You can send a postcard, but all the people can see the information on the postcard. You can put the letter in the envelope and seal it, which protects the letter from being seen by chance. If you do make sure that the letter is only visible to the recipient, you will need to encrypt or encode the letter and confirm that the recipient knows how you coded it.

The same is true for wireless data transfer. No encrypted wireless data is transmitted in the air, and any wireless device nearby can intercept the data.

Using the WEP (Wired Equivalent Protocol) protocol provides minimal security for your wireless network encryption because it is easy to hack. If you really want to protect your wireless data, you should use a more secure encryption method, such as WPA. To help you understand these options, here are some of the existing wireless encryption methods and security technologies:

· WEP (Wired Equivalent protocol). WEP is an encryption method that is used by some manufacturers eager to produce wireless devices to hastily piece together fake encryption standards before protocol standards are finalized. As a result, this standard later found that there were many vulnerabilities, and even an inexperienced attacker could exploit these vulnerabilities.

· WPA (Wi-Fi Protected access). WPA is used to improve or replace a vulnerable WEP protocol. WPA provides more powerful encryption than WEP, addressing many of the weaknesses of WEP.

1.TKIP (Temporary Key Integrity protocol). TKIP is a basic technology that allows WPA to be backward compatible with WEP and existing wireless hardware. Tkip with WEP makes this encryption method more secure than WEP by using a longer key, a 128-bit key, and a key that changes once per click of each packet.

2.EAP (Extensible Authentication Protocol). With the support of the EAP Protocol, WPA encryption provides more functionality to control wireless network access based on the PKI (Public key Infrastructure), rather than filtering on a MAC address only. The filtering method is easy to be deceived by others.

Although WPA improves WEP security and is more secure than the WEP protocol, any encryption is stronger than nothing. If WEP is the only protection that your current wireless device has, this encryption will still prevent you from randomly breaking through your wireless data, allowing most inexperienced attackers to look for unprotected wireless networks.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.