Talk With an Expert

Wireless security beyond WEP and WPA.

Wireless security beyond WEP and WPA. (PDF, 1.91MB)Published: 25 Jul, 2004
Created by:
Eric Peeters

Much as already been said about the use of WEP and WPA in securing wireless networks, and their weaknesses are already well-known. Less has been written about other measures and devices that network administrators may adopt to secure their wireless network, such as disabling SSID broadcasting or carefully calculating the location of access point antennas. This paper attempts to outline several such measures but makes no conclusions as to which should be used, because each wireless network operates within its own environment and what works for one will break another. Instead, at the end of this paper, the reader will hopefully be aware of the pros and cons of each measure and device and will be able to decide for himself or herself which ones would provide additional security to their wireless network.