What are the techniques for Wi-Fi Security?



What are the techniques for Wi-Fi Security?..

Answer / rajendra gupta

Security has been one of the major deficiencies in Wi-Fi, though better encryption systems are now becoming available. Encryption is optional in Wi-Fi, and three different techniques have been defined. These techniques are given here:

Wired Equivalent Privacy (WEP):

An RC4-based 40-or 104-bit encryption with a static key.

Wi-Fi Protected Access (WPA):

This is a new standard from the Wi-Fi Alliance that uses the 40 or 104-bit WEP key, but it changes the key on each packet. That changing key functionality is called the Temporal Key Integrity Protocol (TKIP).

IEEE 802.11i/WPA2:

The IEEE is finalized the 802.11i standard, which is based on a far more robust encryption technique called the Advanced Encryption Standard. The Wi-Fi Alliance designate products that comply with the 802.11i standard as WPA2.

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More Telecom Protocols Interview Questions

Explain Wi-Fi Multimedia Extensions (WME)?

1 Answers  


can u explain call flow for roaming mobile to roaming mobile?(both users are belongs to same state but staying on roaming in different states)

4 Answers   Ericsson, IMI Soft Engineering, TECPL,


Can any one please let me know good Telecom Protocol Development training institute in NCR.

1 Answers   Ericsson,


what'll happen if one isup link gone down? to brief this question...isup link is active between two nodes.if one goes down what are all the messages will be transfered to active node(bit wise,MTP wise)?

1 Answers   Alcatel,


What is IEEE 802.11i/WPA2?

1 Answers  






Explain about RRC States in Umts

7 Answers   Ericsson,


What are the different Types of Polling in RLC A.M Mode

0 Answers   Motorola,


What is meant by Adaptive Modulation

1 Answers  


What are Wi-Fi IEEE Standards?

1 Answers  


Hi I am Ramesh JTO BSNL want to know about the TEMS, a telecom testing tools for GSM and which is the best cdma protocol testing tools ie AGILENT or CAIT or CNT.Whether these have same function.What are the institutes providing these courses.

2 Answers   BSNL,


How to Force a SunOS Machine Not to Be a Router?

0 Answers  


What are the states in Mobility Management?Explain the each briefly.

2 Answers  


Categories
  • Telecom Routers Switches Interview Questions Telecom Routers Switches (87)
  • Telecom Protocols Interview Questions Telecom Protocols (83)
  • Telecom Algorithms Interview Questions Telecom Algorithms (10)
  • Voice Gateways Interview Questions Voice Gateways (17)
  • VoIP IP Telephony Interview Questions VoIP IP Telephony (41)
  • Telecom Security Interview Questions Telecom Security (5)
  • Telecom Hardware Interview Questions Telecom Hardware (12)
  • WiFi Related Interview Questions WiFi Related (726)
  • Telecom General Interview Questions Telecom General (169)
  • Telecom AllOther Interview Questions Telecom AllOther (14)