Explore chapters and articles related to this topic
Privacy Preservation with Machine Learning
Published in Sudhir Kumar Sharma, Bharat Bhushan, Narayan C. Debnath, IoT Security Paradigms and Applications, 2020
P. Bhuvaneswari, Nagender Kumar Suryadevara
The main weakness of WEP is its use of static encryption keys. An eavesdropper can collect a large enough sample of your transmission stream to derive the WEP encryption key, which allows them to decrypt everything being transmitted by you. WPA is more secure than WEP, and it uses an enhanced encryption protocol called TKIP (Temporal Key Integrity Protocol). WPA key generation includes the shared key and network’s name (or SSID) for each client. Keys are refreshed to secure from the WEP attackers. WPA2 [20] is a much better version of Wi-Fi secure protocol than WPA for the stronger security against attacks. WPA2 has stronger encryption and authentication mechanisms, AES and counter mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP). WPA2 maintains TKIP for backward compatibility.
Contemporary Wireless Technologies
Published in G. S. V. Radha Krishna Rao, G. Radhamani, WiMAX, 2007
G. S. V. Radha Krishna Rao, G. Radhamani
WPA2 (Wi-Fi Protected Access 2) provides network administrators with a high level of assurance that only authorized users can access the network. Based on the ratified IEEE 802.11i standard, WPA2 provides government-grade security by implementing the National Institute of Standards and Technology (NIST) FIPS 140-2-compliant AES encryption algorithm. WPA2 can be enabled in two versions — WPA2-Personal and WPA2-Enterprise. WPA2-Personal protects unauthorized network access by utilizing a setup password. WPA2-Enterprise verifies network users through a server. WPA2 is backward compatible with WPA.
Smart home network and devices
Published in Abbas Moallem, Human-Computer Interaction and Cybersecurity Handbook, 2018
Here is how Wikipedia defines WPA and WPA2: Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, Wired Equivalent Privacy (WEP).
Policy-based security for distributed manufacturing execution systems
Published in International Journal of Computer Integrated Manufacturing, 2018
Octavian Morariu, Cristina Morariu, Theodor Borangiu
Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping but it is not considered secure as explained in Boland and Mousavi (2004) and Reddy et al. (2010). Tools such as AirSnort or Aircrack-ng can quickly determine WEP encryption keys. As a response to security concerns of WEP, Wi-Fi Protected Access (WPA) was introduced. Even if WEP is more secured then WPA, it still has known vulnerabilities. WPA2 is using Advanced Encryption Standard and eliminates some of the vulnerabilities of WEP. However, Wi-Fi Protected Setup which allows initial configuration of the Wi-Fi connection cannot prevent WPA and WPA2 security to be broken in several scenarios. Once the network layer is breached, an attacker will have direct access to the higher layer protocols allowing unauthorised access to information, theft of proprietary information, DoS at the protocol layer and impersonation. Berghel and Uecker (2005) and Aime, Calandriello, and Lioy (2007) point out these security concerns. The higher layer protocols can be secured using secure sockets layer (SSL) that provides encryption, authentication and authorisation of the actors involved using a PKI for certificate management. IEEE 802.11i is a more recent Wi-Fi standard that offers improved security mechanisms like Key Derivation Mechanism, AES, CBC-MAC or AES in CTB. A more recent standard proposition IEEE 802.11ai promises a fast initial link set-up function. This would allow a wireless LAN client to achieve a secure link within 100 ms. At this point, there are no commercial implementation available.