Plan Security for Wireless Networks
On completion of this topic you should be able to use WEP encryption and WEP authentication.
The key components of wireless security are authentication and confidentiality. The IEEE 802.11 wireless standard defines open system and shared key authentication types. For data confidentiality, the 802.11 standard defines Wired Equivalent Privacy (WEP). The standard does not define or provide a WEP key management protocol that provides automatic encryption for key determination and renewal. This is a major security limitation, especially for wireless infrastructure mode with a large number of wireless clients. This security issue can be resolved by using IEEE 802.1X port-based network access control.