13.01.2013 Views

Wireless Home Networking - Index of

Wireless Home Networking - Index of

Wireless Home Networking - Index of

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

164<br />

Part III: Installing a <strong>Wireless</strong> Network<br />

With most wireless network systems, you take care <strong>of</strong> both functions with a<br />

single step — the assignment <strong>of</strong> a network key or passphrase (we explain later<br />

in this chapter, in the section “Enabling encryption,” where each <strong>of</strong> these is<br />

used). This key or passphrase is a secret set <strong>of</strong> characters (or a word) that<br />

only you and those you share it with know.<br />

The key or passphrase is <strong>of</strong>ten known as a shared secret — you keep it secret<br />

but share it with that select group <strong>of</strong> friends and family whom you want to<br />

allow access to your network. With a shared secret (key or passphrase), you<br />

perform both <strong>of</strong> these security functions:<br />

� You authenticate users because only those who have been given your<br />

supersecret shared secret have the right code word to get into the network.<br />

Unauthenticated users (those who don’t have the shared secret)<br />

cannot connect to your wireless network.<br />

� Your shared secret provides the mechanism to encrypt (or scramble) all<br />

data being sent over your network so that anyone who picks up your<br />

radio transmissions sees nonsensical gibberish, not data that they can<br />

easily read.<br />

The two primary methods <strong>of</strong> providing this authentication and encryption are<br />

� Wired Equivalent Privacy (WEP)<br />

� Wi-Fi Protected Access (WPA)<br />

Note that there are two versions <strong>of</strong> WPA, WPA and WPA2, but we refer to<br />

them jointly as WPA except when discussing their differences.<br />

We talk about the WEP and WPA security systems in more detail in the remaining<br />

parts <strong>of</strong> this chapter. WEP, an older system, provides only a limited amount<br />

<strong>of</strong> security because certain flaws in its encryption system make it easy for<br />

crackers to figure out your shared secret (the WEP key) and therefore gain<br />

access to your network and your data.<br />

WPA is the current, up-to-date, security system for Wi-Fi networks (there are<br />

several variants, which we discuss later in this chapter), and it provides you<br />

with much greater security than does WEP. If you have the choice, always use<br />

WPA on your network rather than WEP.<br />

The shared secret method <strong>of</strong> securing a network is by far the most common<br />

and the easiest method. But it doesn’t really provide truly bulletpro<strong>of</strong> user<br />

authentication, simply because having to share the same secret passphrase<br />

or key with multiple people makes it a bit more likely that somehow that<br />

secret will get into the wrong hands. (In fact, some experts would probably<br />

hesitate to even call it an authentication system.)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!