Chapter 4

Authentication and encryption

Wireless security is a complex and developing topic. This page gives a brief overview of the basics involved in making a wireless network secure.

In the simplest terms, wireless security involves two strategies: authentication and encryption.

A wireless security method, such as WEP or WPA, involves varying levels of authentication and encryption.

Authentication

Definition

Authentication verifies the identity of a user or device before granting access to a network, making it more difficult for unauthorized users to access network resources.

In order to be authenticated and allowed to use a network, a device must supply a known password to other devices on the network. If the device cannot supply the correct password, it will not be able to use other devices on the network.

Types of authentication

The printer supports three types of authentication. Each type of authentication has its benefits and limitations.

Authentication type

Open System

Shared Key

WPA/PSK

Encryption

Definition

Description

Benefits

Limitations

 

 

 

Devices on a

Least complicated

Provides little

network identify

strategy.

protection against

themselves with the

 

unauthorized users.

network name

 

 

(SSID) only.

 

 

 

 

 

Devices use a

Convenient to use

All devices must

shared master

in conjunction with

have the key. The

secret to identify

WEP, since a WEP

shared key does

themselves as

key can serve as

not change

authorized

the shared

automatically.

members of the

authentication key.

 

network.

 

 

 

 

 

Devices use a

The pre-shared key

All devices must

single pre-shared

and the encryption

have the key.

key (PSK) to

keys are not

 

identify themselves

identical. Allows

 

as authorized

smaller networks to

 

members of the

use WPA without

 

network and to

the need for an

 

generate an

authorization

 

encryption key.

server.

 

 

 

 

28

HP Deskjet 6980 series

Page 30
Image 30
HP 6980 manual Authentication and encryption, Authentication Definition, Types of authentication, Authentication type