What is an encryption algorithm designed to protect wireless transmission data?

Article ID : 00009476 / Last Modified : 05/25/2022

Wireless encryption secures your wireless network with an authentication protocol. It requires a password or network key when a user or device tries to connect. If your wireless network isn't secure, unauthorized users could access your network and obtain personal information or use your internet connection for malicious or illegal activity. Your network speed or performance may decrease if people use your network without your knowledge.

The following information provides details about different types of wireless encryptions that are commonly supported on most Wi-Fi® enabled devices, adapters, and routers.

  • Not all encryption types are supported on all routers and adapters. Check your device manual for supported encryption protocols.
  • The default encryption key may be located on the bottom of your router or in the manual, depending on the router manufacturer.
  • You can locate the encryption key when you log into the router setup page, if you have created your own encryption key. Contact the router manufacturer for assistance if you still can't locate it.

  • 64-bit: This configuration requires a ten character password when you use a hexadecimal (zero to nine and A-F) digits or eight characters when you use ASCII characters.
  • 128-bit: This configuration requires a 26 character password when you use hexadecimal digits or 14 characters when you use ASCII characters.
  • Easy to configure.
  • Widely supported security system.
  • Secures your wireless network better than no encryption at all.
  • Not fully secure.
  • Other encryption protocols are more secure.
  • TKIP: Temporal Key Integrity Protocol
  • PSK: Pre-shared Key or Personal mode. 256-bit encryption that requires a 64 hexadecimal digit password or a 8 - 63 ASCII character passphrase.
  • EAP: Extensible Authentication Protocol
  • Easy to configure.
  • Strong encryption.
  • Easy to manage.
  • Not supported by all devices.

IMPORTANT: There are multiple vulnerabilities found in the Wi-Fi Protected Access 2 (WPA2) wireless LAN communication protocol.

Wi-Fi Protected Setup (WPS)

Advantages

  • Automatically configures a wireless network with a network name (SSID) and a strong WPA security key for authentication and data encryption.
  • Supports various Wi-Fi certified 802.11 products, ranging from access points, wireless adapters, Wi-Fi phones, and other electronic devices.
  • You don't need to know the SSID or security key or passphrase when you connect into WPS enabled devices.
  • The security key or passphrase is randomly generated so no one can guess it.
  • No predictable passphrases or long sequences of hexadecimal characters to enter.

Disadvantages

  • Ad-Hoc mode where wireless devices communicate directly to each other without an access point is not supported.
  • All of the Wi-Fi devices on the network must be WPS certified or compatible, otherwise you won't be able to take advantage of the ease in securing the network.
  • Difficult to add a non-WPS client device to the network because of the long sequences of hexadecimal characters generated by the WPS technology.
  • WPS technology is fairly new, so not every manufacturer supports it.

How Do I Use WPS

  • PIN (Personal Identification Number) Method: A PIN has to be taken from either a sticker label or the Web interface of the WPS device. This PIN is entered in the access point or client WPS device to make the connection.
  • PBC (Push button configuration) Method: Simply push a button, either a physical or virtual button, on both WPS devices to make the connection.

  • Contact Support
  • Parts & Repair

Wired equivalent privacy (WEP)is an encryption algorithm designed to protect wireless transmission data.Wi-Fi protected access (WPA), a wireless security protocol to protect Wi-Fi networks.Mobile device management (MDM)remotely controls smartphones and tablets, ensuring data securityWar chalkingis the practice of tagging pavement with codes displaying where Wi-Fi access is available.War drivingis deliberately searching for Wi-Fi signals while driving by in a vehicle.IT consumerizationis the blending of personal and business use of technology devices and applications.Mobile application managementadministers and delivers applications to corporate and personal smartphonesand tablets.MAM software assists with software delivery, licensing, and maintenance and can limit how sensitivedata can be shared among apps. An important feature of MAM is that it provides corporate networkadministrators with the ability to wipe corporate mobile apps from an end user’s device remotely.Business Applications of Wireless NetworksFIGURE 16.8 The Three Primary Wireless Business Applications.Radio-frequency identification (RFID)uses electronic tags and labels to identify objects wirelessly over shortdistances.It holds the promise of replacing existing identification technologies such as the bar code. RFIDwirelessly exchanges information between a tagged object and a reader/writer.AnRFID tagis an electronic identification device that is made up of a chip and antenna.AnRFID reader (RFID interrogator)is a transmitter/receiver that reads the contents of RFID tags in the area. ARFID system is comprised of one or more RFID tags, one or more RFID readers, two or more antennas (one onthe tag and one on each reader), RFID application software, and a computer system or server.