Professional Documents
Culture Documents
WLAN Workshop
WIRELESS LAN CONFIGURATION
ADVANTAGES AND DISADVANTAGES OF
DIFFERENT SECURITY MODELS
IV
RC4
key
IV
encrypted packet
checksum
organizations.
It is also dived in two section: WPA and WPA2.
All the features of personal security model plus added
benefit of uses a RADIUS server for authentication.
Users are authenticated via a server upon association.
Extremely high defence rate but high investment.
WPA Enterprise
Uses IEEE 802.1x for authentication and TKIP for
encryption.
IEEE 802.1x uses a authentication server to grant or
deny access. The AP forwards the authentication
request to the RADIUS server for verification against
a list.
TKIP is used to provide encryption for the data
packets. Uses WEP features so may be susceptible to
attack in future.
WPA2 Enterprise
Uses IEEE 802.1x for authentication and AES-
Vulnerability Graph
% of Attack
WPA/WPA2 Enterprise
WPA2 (WPS Disbaled)
WPA2 Personal
WPA Personal
% of Attack
WEP
Current Standing
Traditional Model
20
40
60
80
100
120
WEP
Relies on
shared keys.
Uses
Integrity
Check to
ensure
packet not
modifed in
transit.
WPA
Uses same
hardware
using
firmware
upgrade.
Uses TKIP
and RC4
stream
cipher.
WPA2
Requires
hardware
upgrade.
Uses
AES(CCMP).
Compatible
with WPA.