Chapter 4
Authentication and encryption
Wireless security is a complex and developing topic. This page gives a brief overview of the basics involved in making a wireless network secure.
In the simplest terms, wireless security involves two strategies: authentication and encryption.
A wireless security method, such as WEP or WPA, involves varying levels of authentication and encryption.
Authentication
Definition
Authentication verifies the identity of a user or device before granting access to a network, making it more difficult for unauthorized users to access network resources.
In order to be authenticated and allowed to use a network, a device must supply a known password to other devices on the network. If the device cannot supply the correct password, it will not be able to use other devices on the network.
Types of authentication
The printer supports three types of authentication. Each type of authentication has its benefits and limitations.
Authentication type
Open System
Shared Key
WPA/PSK
Encryption
Definition
Description | Benefits | Limitations |
|
|
|
Devices on a | Least complicated | Provides little |
network identify | strategy. | protection against |
themselves with the |
| unauthorized users. |
network name |
|
|
(SSID) only. |
|
|
|
|
|
Devices use a | Convenient to use | All devices must |
shared master | in conjunction with | have the key. The |
secret to identify | WEP, since a WEP | shared key does |
themselves as | key can serve as | not change |
authorized | the shared | automatically. |
members of the | authentication key. |
|
network. |
|
|
|
|
|
Devices use a | The | All devices must |
single | and the encryption | have the key. |
key (PSK) to | keys are not |
|
identify themselves | identical. Allows |
|
as authorized | smaller networks to |
|
members of the | use WPA without |
|
network and to | the need for an |
|
generate an | authorization |
|
encryption key. | server. |
|
|
|
|
28 | HP Deskjet 6980 series |