Scimyst
Subscribe
  • Home
  • Discoveries
    • All
    • 1001 Mysteries
    • Aliens & UFOs
    • Animal World
    • Archaeology
    • Biology
    • Doomsday
    • Famous Landmarks
    • History
    • Mars Exploration
    • Military Science
    • Oceanography
    • Science Q&A
    • Scientific Discoveries
    • Space Science
    • Why
    • World Figures
    • World Wonders
    thanh pho trang 650

    The Lost City of 500 Years Containing Flesh-Eating Parasites

    creating the worlds first plasma lamp not using a wire just throw it away 133669

    Creating the world’s most durable plasma lamp that doesn’t “take a break” after a few days of use

    which country suffers the most natural disasters in the world every year 136695

    Which country suffers the most natural disasters in the world, “experiencing” the most super typhoons each year?

    strange spc exoplanet

    10 Most Strange Things of the Universe

    thuan tay trai 650

    Left-Handed People and 16 “Shocking” Facts

    cham do ben khoe mieng 650

    The Secret of the Two Red Dots at the Corner of the Mouth of the Tang Dynasty Concubine

    tinh van con cua 650

    Revealing Unseen Images of the Crab Nebula through the James Webb Space Telescope

    cau hon o phap 650

    Banning Bathing, Forcing Tears, and Strange Wedding Customs Around the World

    isaac Newton1

    10 Famous Inventions of Isaac Newton

    Trending Tags

    • Events
      • All
      • Science Stories
      • Scientific Projects

      Tonight announces the Ig Nobel Prize winners

      frog

      Frog Wins Ig Nobel Prize 2005

      canhcutIg

      Life is Not Lacking in Quirks

      Nobel Prize in Medicine 2005: A Modern Fairy Tale

      10 Weird Inventions Awarded the Ig Nobel Prize 2005

      nobelKT

      Why Did They Win the Nobel Prize in Economics?

      giaydientu

      “Electronic Paper” Set to Appear on the Market

      Development of Science and Technology in the South Central Coast and Central Highlands Provinces

      a russian scientist loves vietnam 1659

      A Russian Scientist Who Loves Vietnam

    • Lifestyle
      • All
      • Environment
      • Medicine & Health
      tdnong

      Global warming may be the cause of major storms

      traxanh1

      Green tea has effects against dementia

      Discovery of Cancer-Preventing Genes in the Human Body

      Khachdulich Indonesia

      Avian influenza harms tourism more than terrorism

      nao

      Lying – A Disease of People with Brain Defects

      cafe

      Coffee May Prevent Cancer

      tebaocum

      Recreating the ‘Death’ Flu Virus of 1918

      Indo ban

      The whole world unites to fight avian influenza

      HIV aids

      The Mystery of AIDS Epidemic

      Trending Tags

      • Technology
        • All
        • AI - Artificial Intelligence
        • Computer Science
        • New Technology
        • Scientific Inventions
        top apps explore space solar system on pc 98000

        Top Applications for Exploring the Universe and Solar System on PC

        vai dien tu 650

        Soon there will be data-transmitting clothing

        sua loi khong vao dc coc coc 650

        Why can’t Cốc Cốc download videos to the computer?

        may tinh cu 1

        17 Things You Can Do with an Old Computer

        play free games super fun on android devices 54708

        Play Extremely Fun Free Games on Android Devices

        top 10 best weather apps on android 98127

        Top 10 Best Astronomy Apps on Android

        canh tay robot 650

        Robot system helps neutralize mines

        trang trai noi o rotterdam 650

        Modern Cities Combining Gardens and Cattle Farms

        city tree 650

        “High-tech” trees can purify polluted air

      • Cultural Heritage
        ai cap 650

        The Ruins of Memphis & the Pyramid Complex from Giza to Dahshur – Egypt

        khao co 650

        Prehistoric Archaeological Sites in the Dordogne Valley and Caves in the Vézère Valley – France

        baroque churches philippines 67188

        Baroque Churches – Philippines

        mont saint michel france 67265

        Mont Saint Michel Island – France

        acropolis bracelet in athens greece 67621

        Acropolis Fortress in Athens – Greece

        language mo tan thuy hoang china 67087

        Tomb of Qin Shi Huang – China

        historical city ayutthaya 67804

        Historical City of Ayutthaya

        historical city ayutthaya 67804 2

        Historic City of Ayutthaya

        mesa verde national park 67201

        Mesa Verde National Park – United States of America

        Trending Tags

        • Entertainment
          • All
          • Photo Library
          • Videos

          Honesty

          Telephone

          Advanced Technology

          Terminal Illness

          Allergy

          Love Like Mars

          Super Definition

          Coi Sách

          Selling Candy

        No Result
        View All Result
        Scimyst
        • Home
        • Discoveries
          • All
          • 1001 Mysteries
          • Aliens & UFOs
          • Animal World
          • Archaeology
          • Biology
          • Doomsday
          • Famous Landmarks
          • History
          • Mars Exploration
          • Military Science
          • Oceanography
          • Science Q&A
          • Scientific Discoveries
          • Space Science
          • Why
          • World Figures
          • World Wonders
          thanh pho trang 650

          The Lost City of 500 Years Containing Flesh-Eating Parasites

          creating the worlds first plasma lamp not using a wire just throw it away 133669

          Creating the world’s most durable plasma lamp that doesn’t “take a break” after a few days of use

          which country suffers the most natural disasters in the world every year 136695

          Which country suffers the most natural disasters in the world, “experiencing” the most super typhoons each year?

          strange spc exoplanet

          10 Most Strange Things of the Universe

          thuan tay trai 650

          Left-Handed People and 16 “Shocking” Facts

          cham do ben khoe mieng 650

          The Secret of the Two Red Dots at the Corner of the Mouth of the Tang Dynasty Concubine

          tinh van con cua 650

          Revealing Unseen Images of the Crab Nebula through the James Webb Space Telescope

          cau hon o phap 650

          Banning Bathing, Forcing Tears, and Strange Wedding Customs Around the World

          isaac Newton1

          10 Famous Inventions of Isaac Newton

          Trending Tags

          • Events
            • All
            • Science Stories
            • Scientific Projects

            Tonight announces the Ig Nobel Prize winners

            frog

            Frog Wins Ig Nobel Prize 2005

            canhcutIg

            Life is Not Lacking in Quirks

            Nobel Prize in Medicine 2005: A Modern Fairy Tale

            10 Weird Inventions Awarded the Ig Nobel Prize 2005

            nobelKT

            Why Did They Win the Nobel Prize in Economics?

            giaydientu

            “Electronic Paper” Set to Appear on the Market

            Development of Science and Technology in the South Central Coast and Central Highlands Provinces

            a russian scientist loves vietnam 1659

            A Russian Scientist Who Loves Vietnam

          • Lifestyle
            • All
            • Environment
            • Medicine & Health
            tdnong

            Global warming may be the cause of major storms

            traxanh1

            Green tea has effects against dementia

            Discovery of Cancer-Preventing Genes in the Human Body

            Khachdulich Indonesia

            Avian influenza harms tourism more than terrorism

            nao

            Lying – A Disease of People with Brain Defects

            cafe

            Coffee May Prevent Cancer

            tebaocum

            Recreating the ‘Death’ Flu Virus of 1918

            Indo ban

            The whole world unites to fight avian influenza

            HIV aids

            The Mystery of AIDS Epidemic

            Trending Tags

            • Technology
              • All
              • AI - Artificial Intelligence
              • Computer Science
              • New Technology
              • Scientific Inventions
              top apps explore space solar system on pc 98000

              Top Applications for Exploring the Universe and Solar System on PC

              vai dien tu 650

              Soon there will be data-transmitting clothing

              sua loi khong vao dc coc coc 650

              Why can’t Cốc Cốc download videos to the computer?

              may tinh cu 1

              17 Things You Can Do with an Old Computer

              play free games super fun on android devices 54708

              Play Extremely Fun Free Games on Android Devices

              top 10 best weather apps on android 98127

              Top 10 Best Astronomy Apps on Android

              canh tay robot 650

              Robot system helps neutralize mines

              trang trai noi o rotterdam 650

              Modern Cities Combining Gardens and Cattle Farms

              city tree 650

              “High-tech” trees can purify polluted air

            • Cultural Heritage
              ai cap 650

              The Ruins of Memphis & the Pyramid Complex from Giza to Dahshur – Egypt

              khao co 650

              Prehistoric Archaeological Sites in the Dordogne Valley and Caves in the Vézère Valley – France

              baroque churches philippines 67188

              Baroque Churches – Philippines

              mont saint michel france 67265

              Mont Saint Michel Island – France

              acropolis bracelet in athens greece 67621

              Acropolis Fortress in Athens – Greece

              language mo tan thuy hoang china 67087

              Tomb of Qin Shi Huang – China

              historical city ayutthaya 67804

              Historical City of Ayutthaya

              historical city ayutthaya 67804 2

              Historic City of Ayutthaya

              mesa verde national park 67201

              Mesa Verde National Park – United States of America

              Trending Tags

              • Entertainment
                • All
                • Photo Library
                • Videos

                Honesty

                Telephone

                Advanced Technology

                Terminal Illness

                Allergy

                Love Like Mars

                Super Definition

                Coi Sách

                Selling Candy

              No Result
              View All Result
              Scimyst
              No Result
              View All Result
              Home Technology Computer Science

              Wi-Fi Security: Which Solution to Choose?

              by Sci
              January 4, 2006
              in Computer Science
              0
              Share on FacebookShare on Twitter

              Security is a very important issue and particularly a major concern for businesses. Moreover, security is also the reason companies hesitate to set up wireless local area networks (WLAN). They are worried about security in WEP (Wired Equivalent Privacy) and are interested in newer, safer security solutions.

              IEEE and the Wi-Fi Alliance have developed a more secure solution: Wi-Fi Protected Access (WPA) and IEEE 802.11i (also known as “WPA2 Certified” according to the Wi-Fi Alliance), along with another solution called VPN Fix, which also helps enhance wireless network security.

              According to Webtorial, WPA and 802.11i are used at rates of 29% and 22%, respectively. On the other hand, 42% is utilized for other “temporary solutions“, such as securing Virtual Private Network (VPN) systems over wireless local area networks.

              So, which security solution should we choose for wireless networks?

              wireless securityWEP: Inadequate Security

              WEP (Wired Equivalent Privacy) means wireless security equivalent to wired. In fact, WEP combines user authentication and data safety in a single insecure method. WEP uses a static encryption key of either 64 bits or 128 bits (subtracting 24 bits used for the initialization vector, leaving effective key lengths of 40 bits or 104 bits) to authenticate devices allowed to access the network and to encrypt data transmission.

              These encryption keys are easily “cracked” through brute-force algorithms and trial-and-error attacks. Free software like Airsnort or WEPCrack allows hackers to break encryption keys if they collect enough packets—typically between 5 to 10 million—on a wireless network. Keys of 128 bits are not much better since 24 bits are again used for initialization, leaving 104 bits for encryption, which is similarly vulnerable to attacks. Additionally, weaknesses in the initialization vectors allow hackers to find passwords more quickly with significantly fewer packets.

              If encryption key flaws are not addressed, WEP could be improved by using an authentication protocol that provides a new encryption key for each session. The encryption key would change for each session, making it more difficult for hackers to gather enough data packets needed to break the security key.

              Temporary Solution: VPN Fix
              Recognizing the weaknesses in WEP, enterprise users have discovered an effective way to protect their WLANs, called VPN Fix. The basic idea of this approach is to treat WLAN users like remote access service users.

              In this configuration, all WLAN access points and computers connected to these access points are defined within a virtual LAN (VLAN). In this security infrastructure, these devices are treated as “untrusted”. Before any WLAN device connects, it must be authorized by the LAN’s security component. Data and connections from these devices must pass through an authentication server like RADIUS. Then, the connection will be established through a secure, encrypted tunnel using a security protocol such as IPSec, similar to remote access services over the Internet.

              However, this solution is not perfect. VPN Fix requires greater VPN traffic for firewalls and necessitates creating initialization procedures for each user. Furthermore, IPSec does not support multifunction devices such as handhelds and barcode scanners. Finally, from a network architecture perspective, the VPN configuration is merely a temporary solution rather than an integration with WLAN.

              Security Solution via Authentication

              Once the security flaws in wireless LANs were discovered, the industry invested significant effort into resolving this issue. One key point to remember is that we must address two issues: authentication and information security. Authentication ensures that legitimate users can access the network, while security keeps data transmissions safe from interception.

              One advantage of authentication is IEEE 802.1x, which uses the Extensible Authentication Protocol (EAP). EAP serves as a solid foundation for authentication and can be used with various other authentication protocols, including MD5, Transport Layer Security (TLS), Tunneled TLS (TTLS), Protected EAP (PEAP), and Cisco’s Lightweight EAP (LEAP).

              Fortunately, the choice of authentication protocol requires only a few basic factors. Firstly, a mechanism should provide one or two methods of authentication, known as mutual authentication, meaning that the network authenticates the user and the user also authenticates the network. This is critical for WLANs, as hackers could insert unauthorized access points between network devices and legitimate access points (a man-in-the-middle attack) to intercept and alter data packets. Encryption methods like MD5 do not provide mutual authentication and are therefore discouraged for WLAN use.

              802.11i Standard or WPA2

              A long-term solution is to adopt 802.11i, equivalent to WPA2, which is certified by the Wi-Fi Alliance. This standard uses a strong encryption algorithm known as the Advanced Encryption Standard (AES). AES employs a symmetric block encryption algorithm called Rijndael, using block sizes of 128 bits, and can also utilize 192-bit or 256-bit keys.

              To evaluate this encryption standard, the U.S. National Institute of Standards and Technology (NIST) has approved this symmetric algorithm. This encryption standard is used by U.S. government agencies to protect sensitive information. For more details on how the Rijndael algorithm works, you can visit http://en.wikipedia.org/wiki/Rijndael.

              AES is considered significantly more secure than WEP’s 128-bit or 168-bit DES (Digital Encryption Standard). For performance assurance, encryption must be executed in hardware, such as being integrated into chips. However, very few WLAN network cards or access points currently support hardware-based encryption. Furthermore, most Wi-Fi handheld devices and barcode scanners are not compatible with the 802.11i standard.

              WPA (Wi-Fi Protected Access)

              Recognizing the challenges of upgrading to 802.11i, the Wi-Fi Alliance introduced another solution called Wi-Fi Protected Access (WPA). One of the most significant improvements of WPA is the use of the Temporal Key Integrity Protocol (TKIP) for key rotation. WPA also utilizes the RC4 algorithm as WEP does, but with full 128-bit encryption. Another distinguishing feature is that WPA changes keys for each packet. Tools that collect packets for key cracking cannot operate effectively with WPA. Because WPA continuously rotates keys, hackers can never collect enough sample data to determine the password. Additionally, WPA includes a Message Integrity Check to ensure that data cannot be altered during transmission.

              One of WPA’s most appealing aspects is that it does not require hardware upgrades. Free software upgrades for most network cards and access points using WPA are readily available and easy to implement. However, WPA also does not support handheld devices and barcode scanners. According to the Wi-Fi Alliance, around 200 devices have been certified for WPA compatibility.

              WPA offers two options: WPA Personal and WPA Enterprise. Both options use the TKIP protocol, with the only difference being the initial encryption key. WPA Personal is suitable for home and small office networks, where the initialization key is used at access points and workstation devices. In contrast, WPA for enterprises requires an authentication server and 802.1x to provide initialization keys for each session.

              While the Wi-Fi Alliance has implemented WPA and considers it to eliminate all vulnerabilities exploited in WEP, users still do not fully trust WPA. There is a vulnerability in WPA that occurs exclusively with WPA Personal. When the TKIP key rotation function is used to generate encryption keys, if a hacker can guess the initialization key or part of the password, they may determine the entire password, thereby decrypting the data. However, this vulnerability can be mitigated by using initialization keys that are difficult to guess (avoid using simple words like “PASSWORD”).

              This also means that WPA’s TKIP technique is merely a temporary solution, not providing the highest security method. WPA is suitable for companies that do not transmit “sensitive” commercial data or sensitive information. It is also suitable for everyday activities and technology testing.

              Conclusion
              Using VPN Fix over WLAN connections may be a good idea and a step in the right direction. However, the inconvenience, cost, and increased network traffic are barriers that need to be overcome. Transitioning to 802.11i and AES encryption provides the highest security. Yet, organizations are still using thousands of WLAN network cards that do not support this standard. Moreover, AES does not support handheld devices, barcode scanners, or other devices, which are limitations when choosing 802.11i.

              The transition to WPA remains challenging. Although there are still security vulnerabilities and potentially new vulnerabilities may be discovered, at this moment, WPA is the best option.

              Minh Phúc

              I’m sorry, but it seems that there is no Vietnamese article provided for translation. Could you please share the text you would like me to translate?

              Next Post
              10 most surprising things about microsoft in 2005 2576

              The 10 Most Surprising Things About Microsoft in 2005

              funhouse 6 31 super high quality face assembly tool 2577

              Funhouse 6.31: Super Face-Merging Tool

              2006 men online advertising will lead advertising media 2578

              In 2006: Online Advertising Will Lead Advertising Media

              Leave a Reply Cancel reply

              Your email address will not be published. Required fields are marked *

              FEATURED POST

              the mystery of the mummified woman misidentified as an egyptian pharaoh 129359

              The Mystery of the Mummy of the Woman Mistaken for the Pharaoh of Egypt

              space monsters in mythology first appearance 129358

              Cosmic Monster ‘in Legend’ Appears for the First Time

              the most dangerous coastline in the world haunting the dreams of mangrove forests 108247

              The world’s most dangerous strait – The haunting toll measured in sailors’ lives

              10 amazing natural phenomena that challenge science 60818

              23 Mysterious Natural Phenomena That Challenge Science

              TRENDING

              the truth about the 300 year old swan raising in siberia 137566
              Archaeology

              The truth about the 2,300-year-old stuffed swan in Siberia

              why is israel considered the smallest superpower in the world 129258
              Why

              Why is Israel considered the smallest superpower in the world?

              nguoi ai cap co dai 650
              Scientific Discoveries

              What Race Are the Egyptians Ultimately? Why Are They Different from Today’s Africans?

              what happens when you dont eat rice for a month 131509
              Lifestyle

              What Happens When You Don’t Eat Rice for a Month?

              EDITOR PICK'S

              What Race Are the Egyptians Ultimately? Why Are They Different from Today’s Africans?

              Why is sea ice pure like freshwater while the ocean is salty?

              Why is Israel considered the smallest superpower in the world?

              NASA reveals the reason why the entire Starlink satellite “fleet” was dropped

              14 Most Powerful Military Forces in Ancient World History

              The truth about the 2,300-year-old stuffed swan in Siberia

              17 Causes of Throat Tightness and Belching

              Newsletter

              THE MOST IMPORTANT WORLD NEWS AND EVENTS OF THE DAY

              Subscribe to our mailing list to receives daily updates direct to your inbox!

              Category

              • 1001 Mysteries
              • AI – Artificial Intelligence
              • Aliens & UFOs
              • Animal World
              • Antibiotic Resistance
              • Archaeology
              • Bacteria & Insects
              • Biology
              • Biotechnology
              • Climate & Weather

              Site Link

              • Log in
              • Entries feed
              • Comments feed
              • WordPress.org

              About Us

              At Scimyst, we uncover the wonders of science, history, and culture. From ancient mysteries to modern innovations, our stories inspire curiosity and connect you to the fascinating world around us. Explore the unknown with us!

              • About
              • Advertise
              • Privacy & Policy
              • Contact

              © 2025 Scimyst - Your gateway to the wonders of science and culture

              No Result
              View All Result
              • Home
              • Discoveries
                • 1001 Mysteries
                • Aliens & UFOs
                • Animal World
                • Archaeology
                • Biology
                  • Bacteria & Insects
                  • Biotechnology
                  • Plants
                • Doomsday
                • Famous Landmarks
                • History
                  • This Day in History
                • Military Science
                • Mars Exploration
                • Oceanography
                • Science Q&A
                • Science Quiz
                • Scientific Discoveries
                • Space Science
                • Why
                • World Figures
                • World Wonders
                  • Cultural Heritage
                  • Vietnamese Heritage
              • Technology
                • AI – Artificial Intelligence
                • Computer Science
                • New Technology
                  • Self-Driving Cars
                • Scientific Inventions
              • Lifestyle
                • Cancer
                • Environment
                  • Climate & Weather
                  • Disasters
                  • Latest Storm Updates
                  • Nature
                  • Solutions
                • Medicine & Health
                  • Antibiotic Resistance
                  • Common Illnesses
                  • Dengue Fever
                  • Family Medicine Cabinet
                  • Food Safety
                  • Health
                  • Influenza Outbreak
                • Scientific Applications
              • Events
                • Science Events
                • Science Stories
                • Scientific Projects
              • Entertainment
                • Photo Library
                • Videos

              © 2025 Scimyst - Your gateway to the wonders of science and culture