Design Con 2015
Welcome Guest Log In | Register

WPA: How It Works

Authored on: Jul 22, 2004 by Jon LaRosa

Technical Paper

0 0
More InfoLess Info
Wi-Fi Protected Access (WPA) addresses most known Wired Equivalent Privacy (WEP) vulnerabilities and is primarily intended for wireless infrastructure networks as found in the enterprise. This infrastructure includes stations, access points, and authentication servers (typically RADIUS servers). The RADIUS server holds (or has access to) user credentials (user names and passwords) and authenticates wireless users before they gain access to the network. In this article, Jon will discuss how WPA works and provide insight into its function.

Reprinted with permission from CompactPCI Systems / April 2004. Article © OpenSystems Publishing.

View
 
0 comments
write a comment

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page