WIFI AUTHENTICATION MODES AND ENCRYPTION MECHANISMS

WIFI AUTHENTICATION MODES AND ENCRYPTION MECHANISMS


I)                  WiFi Authentication Modes

When you are authenticating clients to a wireless network, two processes are available:
1)    Open system authentication:

Is used in situations where you want to make your network available to a wide range of clients. This type of authentication occurs when an authentication frame is sent from a client to an access point. When the accesspoint receives the frame, it verifies its SSID, and if it’s correct, the access point sends a verification frame back to the client, allowing the connection to be made.

2)    Shared key authentication:


 In this process, each client receives the key ahead of time and then can connect to the network as needed. This is how shared key authentication works:
1. The client sends an authentication request to the access point.
2. The access point returns a challenge to the client.
3. The client encrypts the challenge using the shared key it is configured with.
4. The access point uses the same shared key to decrypt the challenge; if the responses match, then the client is validated and is given access to the network.




II)              Wireless Encryption Mechanisms

The following are some of the more commonly used wireless encryption and authentication protocols in use:
1)    Wired Equivalent Privacy (WEP) is the oldest and arguably the weakest of the available encryption protocols. The WEP standard was introduced as the initial solution to wireless security but was quickly found to be flawed and highly vulnerable.
The WEP protocol is still regularly encountered as an option on many wireless access points and devices but should be avoided in favor of other options or upgrading hardware to support newer standards where possible. However, if these options aren’t realistic at the time, then it can suffice as a short-term solution but should be combined with other security technologies just in case.
2)    WiFi Protected Access (WPA) was the successor to WEP and was intended to address many of the problems that plagued WEP. In many areas it succeeded and made for a much tougher security protocol. WPA uses Temporal Key Integrity Protocol (TKIP) and message integrity code (MIC).
3)    WPA2 is the successor to WPA and was intended to address the problems with WPA. WPA2 is much stronger and uses tougher encryption in the form of AES and CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol). The standard also comes in a version that uses stronger systems such as Extensible
Authentication Protocol (EAP), TKIP, and AES (with longer keys).
4)    WPA2 Enterprise is a version that incorporates EAP standards as a way to strengthen security as well as scale the system up to large enterprise environments. WPA2, as an enterprise solution, uses RADIUS or similar technology to centralize and manage access to the wireless network.

III)           Authentication Technologies

1)    EAP is incorporated into multiple authentication methods, such as token cards, Kerberos, and certificates.
2)    Lightweight Extensible Authentication Protocol (LEAP) is a proprietary WLAN authentication protocol developed by Cisco.
3)    Remote Authentication Dial-In User Service (RADIUS) is a centralized authentication and authorization management system.
4)    802.11i is an IEEE standard that specifies security mechanisms for 802.11 wireless networks.

Nhận xét

Bài đăng phổ biến từ blog này

HƯỚNG DẪN ĐỔI TÊN WIFI (SSID) CHO MODEM ZTE F600W CỦA VNPT

HƯỚNG DẪN DÙNG SMART PHONE CÀI ĐẶT CONVERTER GPON (Modem I-LINK 400N)

HƯỚNG DẪN CÀI ĐẶT MODEM WIFI TOTO LINK N300RT LÀM REPEATER