Security Protocols: Protecting Your Wireless Network


Article date:
When it comes to wireless network, it is essential to know whether the connection is proper and safe. Many wireless networks are not protected from cracking, that's why your data can be under threat. However, many intruders (hackers) use these oversights to invade the privacy of users.



The system of a wireless network is very important to target the issue of security. Many wireless networks are not protected from cracking, that's why your data can be under threat; this fact has become a "full plate" for hackers to invade the privacy of users.

Currently Wireless obtains various standards like 802.11 and 802.11i for security in Wi-Fi, 80211r for keeping the connection in different service areas, 802.11 standard, which maintains wireless connections internally and externally, such as the cell. It enters the encrypted protocols, and encryption on a wireless network is essential, while with the help of it the data traveling between your PC and router are simply encoded.

Below you can find various security protocols and their characteristics compared:


WEP
WEP

WEP, which stands for Wired Equivalent Privacy, was the first security protocol to be used both for security in wired and wireless networks. It belongs to the family of the 802.11 standard, the model used by various protocols.

After several studies on the WEP protocol to guide the hardware, several problems and security holes were found, making the WEP a little below the other protocols.


WPA
WPA

The Wi-Fi Protected Access, WPA, 802.11i. Its modalities include the use of encryption and TKIP 802.1X/EAP, in addition to compatibility with WEP. The protocol was released in 2003, aiming to improve the security of wireless networks, fixing some bugs of WEP. In simpler words it is an upgrade of the previous system.


WPA2
WPA2

WPA2 is the final version of WPA. Unlike the WPA, WPA2 is the encryption system in which the system uses WPA TKIP (Temporal Key Integrity Protocol) and WEB. WPA2 protocol is based on AES, Advanced Encryption Standard.


TKIP

TKIP (Temporal Key Integrity Protocol) was created to try to correct errors of the WEP security system. For the inventors of the system the 802.11 standard is not a good solution for security. Even the developers argue that TKIP has a ratio more than the WEP, in which the TKIP encrypts packet key mixing automatically, while the WEP key comprises a stable key, known as "temporal key". On the other hand, WEP supports passwords encrypted 64-bit and 128-bit at a time, while TKIP uses only 128-bit keys.

TKIP is intended to leave out the invaders out of your system, even if the hacker can "break" your key, the release will last only a few seconds, because TKIP applies a temporary key in which the hacker would have to try to invade again.


IPsec
IPsec

The IPsec protocol, or IP Security Protocol, is a security system, which provides privacy and ensures the sent data (such as downloads, IP sharing, use of torrents). IPsec aims at making security of TCP and UDP networking.



Besides all these, the systems have WPA-PSK and WPA2-PSK. WPA-PSK TKIP encryption is one that is used by many home users of wireless networks. Since WPA-PSK2, AES is one that has an adequate resistance against hackers. The Advanced Encryption Standard (AES) is a great security system, but requires processing to its functionality.

However, besides using protocols for extra protection, you should use passwords with at least 15 to 20 characters, alternating letters and numbers. It's obvious that you always should improve the security of your data. Also check here for the guide with tips for the user to prevent attacks on their network.



Article tags:   

Please put this link on your website, forum or blog:  


Leave:
your:
opinion:
enter name:

39 + 29 =

2 comments of our visitors:

01 February 2012 wrote:
It is very interesting to know about different security protocols that are available. However, we you are going to coffee shop to drink some coffee, you don’t really know whether your connection is encrypted or not. You just surf and get all the information that is needed at that time. Let’s hope that if we don’t surf at home, the security protocol that is used is the Advanced Encryption Standard (AES).
 
 
15 February 2012 wrote:
For me it looks like that IPsec protocol will be one of the most useful. Since we are downloading a lot of files, and use torrents, IPsec seems to protect our data. No doubts, if someone cracks your network you can lose not only a lot of important information but also number of your bank accounts, passwords etc.
 

Popular phone cards

AT&T
Values:
$
Continental
Values:
$5 $7 $10 $20 $50 $100 $250
Lucky Minutes
Values:
$5 $10 $20 $50 $100
Bizon
Values:
$5 $10 $20 $50 $100 $250
Partner
Values:
$5 $10 $20 $50 $100 $250
Simply
Values:
$5 $10 $20 $50 $100 $250
Jupiter
Values:
$5 $10 $20 $30 $50 $100 $250
Solaris
Values:
$5 $10 $20 $50 $100