Wi-Fi is a wireless LAN; is one of the important technologies of computer networking because it allows the users to connect to the internet technology without wires; The network is connected through an access point for the internet and is connected to a USB Port. Firstly to share information has a threat of getting leaked, misused or easily manipulated if Wifi is involved. Secondly, personal privacy can be neglected and damaged completely if wrong information gets into the wrong hands so for that purpose wifi security or WIRELESS SECURITY was introduced. Wireless security is the prevention of access or damage to computers or data so that our data can be safe and secure. The most common types of Wi-Fi security are WEP and WAP.
Wired/Wifi Equivalent Privacy (WEP):
Firstly, Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standards ratified in 1997; moreover, its intention was to provide data confidentiality comparable to that of a traditional wired network but WEP; because it is recognizable by its key of 10 or 26 hexadecimal digits (40 or 104 bits).WEP was at one time widely in use and was often the first security because of its easy usage. Furthermore, WEP uses two types of authentication which include Open System authentication and Shared Key authentication.
Wi-Fi Protected Access (WPA):
Secondly, In 2003 the Wi-Fi Alliance announced that WEP had been superseded by Wi-Fi Protected Access (WPA). In 2004, with the ratification of the full 802.11i standard (i.e. WPA2), the IEEE declared that both WEP-40 and WEP-104 have been deprecated. WEP was the only encryption protocol available to 802.11a and 802.11b devices built before the WPA standard; which was available for 802.11g devices. However, some 802.11b devices were later provided with firmware and software updates to enable WPA. Moreover, WPA has multiple versions which include WPA, WPA2 and WPA3.
Comparison Of WEP and WPA:
Comparison | WEP | WPA | WPA2 |
Crypt | RC4 | RC4 | AES |
Key Rotation | none | Dynamic session keys | Dynamic session keys |
Key Distribution | Manual insert over each device | Automatic distribution is possible | Automatic distribution is possible |
Authentification | Use WEP key | 802.1x &EAP supported | 802.1x &EAP supported |
In conclusion to the topic, we know that wireless fidelity has a great impact on our society and plays a vital role in building the future as it has great scope moreover we learnt that there are many version of wifi 802.11a, 802.11b, 802.11g and 802.11n. Next, we have studied or discussed the CSMA/ CA and CSMA/ CD and its specifications and working or the complete process of them both using the flowchart. Lastly, we have learnt the role of wifi and wifi security which has three major components which are WEP, WPA and WPA2