WEP, WPA, and WPA2 Networks Comparison Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Wireless local area networks (WLANs) play an indispensable part in today’s communications infrastructure. Although WLANs are more versatile and convenient than wired networks, they also tend to be slower and less secure. Effectively addressing the latter problem with minimal hindrance to performance is the purpose of WLAN security protocols. WEP, WPA, and WPA2 protocols are the results of successive attempts at reaching this goal. Throughout their development, different methods of security provision were tried, leading to divergent results.

Comparing the effectiveness of WLAN security protocols reveals considerable improvement from earlier to more advanced versions. However, this progress has not been linear and straightforward in all regards. The earliest protocol, WEP (Wired Equivalent Privacy), offers weak encryption that could be overcome within hours (Osterhage, 2018). Its weakness stems from the entire network using a single encryption key using 40-bit or, in later updates, 104-bit encryption. By contrast, the Wi-fi Protected Access (WPA) protocol uses the Temporal Key Integrity Protocol (TKIP) to generate temporary 128-bit keys for individual packets and authenticate message integrity. WPA2 further improves on its predecessor by incorporating the Advanced Encryption Standard in its encryption protocol, allowing it to encrypt individual blocks. While each new protocol makes it progressively harder to compromise entire networks, those improvements are partly offset by increased performance requirements. All security protocols reduce WLAN throughput, but WPA causes a much sharper drop than WEP, which also offers better performance than WPA2 with IPv6 (Alghamdi, 2019). Thus, the decision to use any of those protocols is based on a tradeoff between security and speed.

WEP, WPA, and WPA2 represent distinct stages in the development of WLAN security measures. Whereas WEP uses a single cipher key for the whole network, WPA encrypts data packets, and WPA2 encrypts individual blocks. Although more granular security methods make it significantly harder to compromise the entire network, they are also more demanding from the performance standpoint. While WPA2 is far superior in terms of security, it may be less desirable for older devices due to its resource requirements.

References

Alghamdi, T. M. (2019). Throughput analysis of IEEE WLAN “802.11 ac” under WEP, WPA, and WPA2 security protocols. International Journal of Computer Networks, 9(1), 1-13.

Osterhage, W. (2018). Wireless network security (2nd ed.). CRC Press.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, September 25). WEP, WPA, and WPA2 Networks Comparison. https://ivypanda.com/essays/wep-wpa-and-wpa2-networks-comparison/

Work Cited

"WEP, WPA, and WPA2 Networks Comparison." IvyPanda, 25 Sept. 2022, ivypanda.com/essays/wep-wpa-and-wpa2-networks-comparison/.

References

IvyPanda. (2022) 'WEP, WPA, and WPA2 Networks Comparison'. 25 September.

References

IvyPanda. 2022. "WEP, WPA, and WPA2 Networks Comparison." September 25, 2022. https://ivypanda.com/essays/wep-wpa-and-wpa2-networks-comparison/.

1. IvyPanda. "WEP, WPA, and WPA2 Networks Comparison." September 25, 2022. https://ivypanda.com/essays/wep-wpa-and-wpa2-networks-comparison/.


Bibliography


IvyPanda. "WEP, WPA, and WPA2 Networks Comparison." September 25, 2022. https://ivypanda.com/essays/wep-wpa-and-wpa2-networks-comparison/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1