Apply wireless transmission security (WEP, WPA)

14 Communications Technology – Wireless Transmission Security

What is WEP? 🔓

Wired Equivalent Privacy (WEP) was the first standard for wireless encryption. It was designed to give a wireless network the same level of security as a wired one, but in practice it’s like using a simple lock that can be picked very quickly.

WEP uses a 24‑bit key (3 bytes) plus a 40‑bit or 104‑bit key, but the key is transmitted in the clear. Attackers can capture packets and recover the key in minutes.

What is WPA? 🛡️

Wi‑Fi Protected Access (WPA) was introduced to replace WEP. It uses stronger encryption algorithms and a dynamic key system.

  • TKIP – Temporal Key Integrity Protocol, a temporary upgrade to WEP.
  • AES – Advanced Encryption Standard, the most secure option in WPA2.
  • Dynamic key generation: keys change every 256 packets, making it much harder to crack.

How to Apply Wireless Security in Practice

  1. Access the router’s web interface (usually 192.168.1.1).
  2. Navigate to the Wireless Security section.
  3. Select WPA‑PSK (or WPA2‑PSK for stronger security).
  4. Choose AES as the encryption type.
  5. Enter a strong passphrase (at least 8 characters, mix of letters, numbers, symbols).
  6. Save settings and reboot the router.

Exam Tip Box 📚

Remember: In exam questions, you’ll be asked to explain why WEP is insecure and how WPA improves security. Use the comparison table below and mention TKIP and AES.

Comparison Table of WEP vs WPA

Feature WEP WPA
Encryption Algorithm RC4 with 40/104‑bit key TKIP (RC4) or AES (128‑bit)
Key Management Static key, transmitted in clear Dynamic key, changes every 256 packets
Vulnerability Can be cracked in minutes Much harder to crack; requires significant effort
Recommended Use Not recommended Use WPA2‑PSK with AES for best security

Analogy: The Lock and Key

Imagine your wireless network is a house. WEP is like a cheap padlock that can be opened with a simple pick. WPA is like a high‑security lock that changes its tumblers every time you enter, so a thief can’t just use the same key again.

Quick Quiz for You

  1. What does TKIP stand for?
  2. Why is AES considered stronger than RC4?
  3. Explain in one sentence why WEP is no longer recommended.

Revision

Log in to practice.

0 views 0 suggestions