28
Service Set Identification (SSID)
The Service Set Identification (SSID) is a thirty-two alphanumeric character (maximum) string
identifying the wireless local area network. Some vendors refer to the SSID as network name. For
stations to communicate with each other, all stations must be conf igured with the same SSID.
A wireless LAN consisting of nodes operating in ad-hoc configur ation without an access point is
called a Basic Service Set (BSS). All nodes in a BSS must use the s ame Basic Service Set ID
(BSSID).
In an infrastructure configuration with access points, multiple BS S can be configured to form an
Extended Service Set (ESS). In this configuration, the access points are configured with the same
Extended Service Set ID (ESSID). Wireless clients configured with t he same ESSID can freely roam
from one Access Point domain to another and still maintain seam less connection to the network
Authentication and WEP Encryption
The absence of a physical connection between nodes makes the wireless links vulnerable to
information theft. To provide a certain level of security, IEEE 802.11 standard has defined two types
of authentication methods, Open System and Shared Key. Open S ystem authentication is a null
algorithm. Shared Key authentication is an algorithm where both the tr ansmitting node and the
receiving node share an authentication key to perform a checks um on the original message. By
default, IEEE 802.11 wireless devices operate in an open system net work.
Wired Equivalent Privacy (WEP) data encryption is utilized whe n the wireless nodes or access
points are configured to operate in Shared Key authentication mode. T here are two shared key
methods implemented in most commercially available products, 4 0-bit WEP data encryption and
128-bit WEP data encryption.
The 40-bit WEP data encryption method, allows for a five-character (40- bit) input. Additionally, 24
factory-set bits are added to the 40-bit input to generate a 64-bit encr yption key. (The 24 factory-set
bits are not user configurable.) This encryption key will be used to encr ypt/decrypt all data
transmitted via the wireless interface. Some vendors may refer to the 40- bit WEP data encryption
as 64-bit WEP data encryption since the actual encryption key used in t he encryption process is 64
bits wide.
The 128-bit WEP data encryption method consists of 104 configurable b its. Similar to the 40-bit
WEP data encryption method, the remaining 24 bits are factory set and not user configurable. Some
vendors allow passphrases to be entered instead of the cryptic hexadecim al characters to ease
encryption key entry.
Encryption Key
Size
# of
Hexadecimal
Digits
Example of Hexadecimal Key Content
64-bit
(24+40) 10 4C72F08AE1
128-bit
(24+104) 26 4C72F08AE19D57A3FF6B260037