TELECOMMUNICATIONS SYSTEMS
COMMUNICATION WIRELESS COMPUTING DEVICES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Open
|
|
802.1x
|
|
802.11
|
|
Shared Key
|
Detailed explanation-1: -Shared Key Authentication (SKA) is a verification process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol. With SKA, a computer equipped with a wireless modem can fully access any WEP network and exchange encrypted or unencrypted data.
Detailed explanation-2: -For secret key authentication to work, the two parties to a transaction must share a cryptographic session key which is also secret, known only to them and to no others. The key is symmetric; that is, it is a single key used for both encryption and decryption.
Detailed explanation-3: -With OSA’s open authentication method, any device can communicate with the access point, whereas SKA devices must use a WEP key for authentication. However, SKA uses a simple challenge-response protocol. As such, it is vulnerable to dictionary attacks and potential damage to WEP keys.
Detailed explanation-4: -Open authentication is used with wireless networks. Pre-shared keys are used with wired networks. Pre-shared keys require an encrypted secret word. Open authentication does not require a secret word.