WiFi And Its Security Protocols

WiFi is the term used for the wireless communication between computers and computer related devices like Laptops, Tablets and Mobiles. In this technology Higher Frequency Radio Waves are used to transfer data. The main benefit of WiFi is cordless internet access. Many electronic devices have built-in WiFi and can access the internet anywhere within range of your wireless router. This means that while using a WiFi laptop or computer, you can browse the internet while you are on your bed or couch.

But with increase in usage of WiFi, several bugs and security loopholes came up. In order to tackle this, Wi-Fi Alliance created some security protocols. Take a look at these security protocols described below:


WEP (Wired Equivalent Privacy) was the default encryption protocol introduced in the first IEEE 802.11 standard back in 1999. IVs are too short for about 24 bit, as only 5000 packets are required for its collision. In simple words it can be hacked easily.


WPA is updated version of WEP and it improves the authentication and encryption features. WPA is packed with two powerful changes of Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES) to maximize security. WPA have two variations namely, WPA-PSK and WPA 2.


Again WPA Pre Shared Key is the upgraded version of WPA which enhances the security by setting a static key or passphrase as with WEP. Inclusion of the above mentioned features make it difficult for hackers to crack this security. There is also another variation in WPA known as WPA 2.

WPA 2:

The final release of the 802.11i standard was adopted and received the commercial name WPA2 from the Wi-Fi Alliance. There are several security keys in this variation of WPA. WPA2 Pre-Shared Key (PSK) utilizes keys that are 64 hexadecimal digits which means that it is much hard to crack its security.

With time these securities will become vulnerable and new securities will be discovered and implemented. Do you think there is a need of new WiFi securities?

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>