COMPUTER NETWORKING

WIRELESS NETWORKS AND MOBILE IP

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
WPA replaces WEP with ____
A
WPA2
B
Temporal Key Integrity Protocol (TKIP)
C
Cyclic Redundancy Check (CRC)
D
Message Integrity Check (MIC)
Explanation: 

Detailed explanation-1: -The Temporal Key Integrity Protocol, or TKIP, is a wireless network technology encryption protocol. It was designed and implemented as an emergency, short-term fix for the security vulnerabilities in WEP (Wired Equivalent Privacy).

Detailed explanation-2: -WEP is not secure as other encryption types such as TKIP. TKIP-Temporal Key Integrity Protocol (TKIP) uses the same encryption algorithm as WEP. However, TKIP is more secure and has an additional message integrity check (MIC).

There is 1 question to complete.