Wired Equivalent Privacy

340 Words1 Page

The physical layer of the system is generally secured by an association's physical security—customary locks, keys, and different types of physical access control. must not approach the physical links and other system equipment which make up the system. Remote correspondence, particularly radio, presents new inconveniences. For instance, radio

waves go through most dividers effortlessly. This element requires the utilization of encryption. Wired Equivalent Privacy (WEP) was the principal endeavor at giving security on remote connections. Nonetheless, Borisov et. al [10] found a shortcoming in key administration, with the outcome that after an assailant had gotten an adequate number of parcels, she could see all movement and infuse counterfeit

More about Wired Equivalent Privacy

Open Document