This is the the technology which is very basic understanding on Wi- Fi technology..
What is Wi-Fi technology and how is working and also the advantages of wi-fi.....
2. CONTENTS
: WHAT IS WPA
: HISTORY OF WPA
: CONCEPT OF WPA
: WI-FI PROTECTED ACCESS -2
: GENERAL RECOMMENDATIONS
:ADVANTAGES & LIMITATION OF WPA
: CONCLUSION
: REFERENCIES
3. What is WPA?
Wi-Fi Protected Access (WPA) is a response by the
WLAN industry to offer an immediate, a stronger
security solution.
WPA is intended to be:
A software/firmware upgrade to existing access points
and NICs.
Inexpensive in terms of time and cost to implement.
Compatible with vendors.
Suitable for enterprise, small sites, home networks.
Runs in enterprise mode or pre-shared key(PSK
mode)
4. History of WPA
WPA was created by the Wi-Fi Alliance, an
industry trade group, which owns the
trademark to the Wi-Fi name and certifies
devices that carry that name.
WPA is designed for use with an IEEE 802.1X
authentication server, which distributes
different keys to each user.
5. History of WPA
The Wi-Fi Alliance created WPA to enable introduction of
standard-based secure wireless network products prior to the
IEEE 802.11i group finishing its work.
The Wi-Fi Alliance at the time already anticipated the WPA2
certification based on the final draft of the IEEE 802.11i
standard.
6. concept of WPA
Data is encrypted using the RC4 stream cipher, with a
128-bit key and a 48-bit initialization vector (IV).
One major improvement in WPA is the Temporal Key
Integrity Protocol (TKIP), which dynamically changes
keys as the system is used.
When combined with the much larger IV, this defeats
the well-known key recovery attacks on WEP.
7. General Recommendations
Conduct a risk assessment for all information that
will travel over the WLAN and restrict sensitive
information.
Policies and infrastructure for authenticating remote
access users can be applied to WLAN users.
Perform regular audits of the WLAN using network
management and RF detection tools.
8. *Minimize signal leakage through
directional antennas and placement of
access points.
*Make sure all equipment being
purchased can be upgraded to
support WPA and WPA 2/AES.
*If using Pre-Shared Key Mode consider
that the shared secret may become
compromised.
9.
10. THE FUTURE WAP 2
TKIP encryption, 802.1X/EAP authentication and PSK
technology in WPA are features that have been brought
forward from WPA2.
Additionally, WPA2 provides a new, encryption scheme, the
Advanced Encryption Standard (AES).
AES uses a mathematical ciphering algorithm that employs
variable key sizes of 128-, 192- or 256-bits.
WPA2 offers a highly secure “mixed mode” that supports
both WPA and WPA2 client workstations.
11. ADVANTAGES
It’s flexible: With a wireless network you and your staff can
have uninterrupted access to people, information and tools as
you and they move through the workplace with your mobile
PC.
It’s responsive: As you change your business operations
your wireless network can change with you.
It’s customized: Your wireless network can be configured
the way you want it.-even combined with your current wired
network
12. It’s fast:
From 11 to 54 Mbps throughput and
advanced roaming capabilities provide reliable access
to e-mail, the Internet, file sharing and other
network resources away from the desk.
It’s cost-effective: Expand and extend your
existing network by simply adding more adapters and
access points. Planning is a no brainier as you need
to buy only what you need.
It’s secure: Current standards utilizes 64- and 128bit WEP encryption and help guard the network from
intruders and protect data in transit. Add in
technology and you have increased WLAN protection
important for mission-critical data.
13. LIMITATION
* It has a limited bandwidth of about 83.5 MHz.
*Frequency spectrum used by IEEE 802.11b is shared by many
other systems like microwave ovens, cordless phones etc. This
frequency sharing causes interference problem.
* Security techniques are not reliable yet.
15. conclusion
As a subset of WPA2, WPA presents users with a solution
that is both forward- and backward-compatible with
present and future wireless standards.
It offers enterprise-grade protection
importantly, it is available today.
and,
most
WPA allows users, whether they are at home or at work,
to enjoy all the mobility and flexibility that Wi-Fi wireless
computing has to offer, knowing that their data is safely
protected beyond the reach of intruders.
16. References
“Overview of IEEE 802.11 Security”, www.techonline.com.
www.wikipedia.org
www.lib-asc.ekm.org
www.wi-fi.org
Paper on Wi-Fi security from the Wi-Fi alliance.
www.entecollege.com
www.ieeespectrum.com