Comparing Wireless Security

Comparing Wireless Security

There are abounding options accessible for security, and you will charge to accomplish a accommodation on which one

to use. Table G-4 compares the assorted aegis mechanisms.

Table G-4 Wireless Aegis Mechanisms

Strength Keys Standardization

WEP Can able with freely

available tools

Static keys accepted to

both the radio cards and

access point

Part of antecedent 802.11 standard

TKIP Adequate aegis for

most wireless LANs

Unique keys automatically

assigned to radio cards,

and keys change

periodically

Included in the 802.11i standard

AES Very strong, acceptable enough

for some government

systems

Unique keys automatically

assigned to radio cards,

and keys change

periodically

Included in the 802.11i standard

WPA Adequate for best wireless

LANs and acceptable abundant for

some government systems

Unique keys automatically

assigned to radio cards,

and keys change

periodically

Ratified by the Wi-Fi Alliance