What are the techniques for Wi-Fi Security?
Answer / rajendra gupta
Security has been one of the major deficiencies in Wi-Fi, though better encryption systems are now becoming available. Encryption is optional in Wi-Fi, and three different techniques have been defined. These techniques are given here:
Wired Equivalent Privacy (WEP):
An RC4-based 40-or 104-bit encryption with a static key.
Wi-Fi Protected Access (WPA):
This is a new standard from the Wi-Fi Alliance that uses the 40 or 104-bit WEP key, but it changes the key on each packet. That changing key functionality is called the Temporal Key Integrity Protocol (TKIP).
IEEE 802.11i/WPA2:
The IEEE is finalized the 802.11i standard, which is based on a far more robust encryption technique called the Advanced Encryption Standard. The Wi-Fi Alliance designate products that comply with the 802.11i standard as WPA2.
| Is This Answer Correct ? | 1 Yes | 0 No |
Why Wi-Fi is Half Duplex?
How is the environment working in telecom protocols?. i mean does we have to work manually with bytes calculation? or there will be a ready tool which we just need to take report n compare?. i have idea to this course? but i dnt knw what going to do with this jobs? please give me informations that can be used? n how is the scope for this?
Hi Iam doing a Manualtesting job in small company and my educational background is MCA i want to learn TELECOM PROTOCOL TESTING " please give any suggestion how is my carrier in IT filed and job opportunity cnances.is am i eligible for Protocol testing ?
Which ISUP message iused by HLR while enquiring IN, in case of MO call of prepaid?
Explain about RRC States in Umts
hey,frnds.....i want to do a telecom protocol development course in hyd or blore.plz mention some good instituition.what is its scope.plz help me out.course(MAC,RLC,RRC,VOIP,3G,GSM)
Explain Wi-Fi Protected Access (WPA)?
HEY FRIENDS, CAN ANYONE TELL ME A GOOD INSTITUTE FOR TELECOM PROTOCOL DEVELOPMENT COURSE IN PUNE/MUMBAI
What is Wi-Fi ?
How to Set a Netmask under SunOS?
What is the need of CPG message in ISUP protocol?
Explain rrc states in umts?