User’s Manual for the NETGEAR Double 108 Mbps Wireless PC Card
The IEEE introduced the WEP as an optional security measure to secure 802.11
802.11products and offers forward compatibility with 802.11i, the new wireless security architecture being defined in the IEEE.
WPA offers the following benefits:
•Enhanced data privacy
•Robust key management
•Data origin authentication
•Data integrity protection
Starting August of 2003, all new
While the new IEEE 802.11i standard is being ratified, wireless vendors have agreed on WPA as an interoperable interim standard.
How Does WPA Compare to WEP?
WEP is a data encryption method and is not intended as a user authentication mechanism. WPA user authentication is implemented using 802.1x and the Extensible Authentication Protocol (EAP). Support for 802.1x authentication is required in WPA. In the 802.11 standard, 802.1x authentication was optional. For details on EAP specifically, refer to IETF's RFC 2284.
With 802.11 WEP, all access points and client wireless adapters on a particular wireless LAN must use the same encryption key. A major problem with the 802.11 standard is that the keys are cumbersome to change. If you don't update the WEP keys often, an unauthorized person with a sniffing tool can monitor your network for less than a day and decode the encrypted messages. Products based on the 802.11 standard alone offer system administrators no effective method to update the keys.
Wireless Networking Basics |
August 2004