Skip to Content
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
book

Real 802.11 Security: Wi-Fi Protected Access and 802.11i

by Jon Edney, William A. Arbaugh
July 2003
Intermediate to advanced content levelIntermediate to advanced
480 pages
12h 4m
English
Addison-Wesley Professional
Content preview from Real 802.11 Security: Wi-Fi Protected Access and 802.11i

Chapter 6. How IEEE 802.11 WEP Works and Why It Doesn't

This chapter is dedicated to failure. It focuses entirely on WEP, the security method originally employed with Wi-Fi LANs and which has now been discredited due to its numerous security weaknesses. It may seem strange to devote so much space to a protocol that will soon be consigned to history. However, an understanding of WEP and its failure modes is very educational as a case study and highlights the areas that need to be addressed for real security. The first half of the chapter looks at the design of WEP and the second half shows why it fails to meet its security goals.

Introduction

For the first five years of its life, IEEE 802.11 had only one method defined for security. This was called ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN

How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN

CCNA Lee Barken - CISSP MCP CPA
Enterprise Java™ Security: Building Secure J2EE™ Applications

Enterprise Java™ Security: Building Secure J2EE™ Applications

Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin
Wireshark for Wireless LANs

Wireshark for Wireless LANs

Jerome Henry / James Garringer

Publisher Resources

ISBN: 0321136209Purchase book