Comparing Wireless Security
There are abounding options accessible for security, and you will charge to accomplish a accommodation on which one
to use. Table G-4 compares the assorted aegis mechanisms.
Table G-4 Wireless Aegis Mechanisms
Strength Keys Standardization
WEP Can able with freely
available tools
Static keys accepted to
both the radio cards and
access point
Part of antecedent 802.11 standard
TKIP Adequate aegis for
most wireless LANs
Unique keys automatically
assigned to radio cards,
and keys change
periodically
Included in the 802.11i standard
AES Very strong, acceptable enough
for some government
systems
Unique keys automatically
assigned to radio cards,
and keys change
periodically
Included in the 802.11i standard
WPA Adequate for best wireless
LANs and acceptable abundant for
some government systems
Unique keys automatically
assigned to radio cards,
and keys change
periodically
Ratified by the Wi-Fi Alliance