SlideShare a Scribd company logo
1 of 14
WEP -WAP - WAP2
WEP
• WEP (Wired Equivalent Privacy) is the oldest and most common Wi-Fi security
protocol. It was the privacy component established in the IEEE 802.11, a set of
technical standards that aimed to provide a wireless local area network (WLAN)
with a comparable level of security to a wired local area network (LAN).
• The Wi-Fi Alliance ratified WEP as a security standard in 1999. Once touted to
offer the same security benefits as a wired connection, WEP has been plagued
over the years by many security flaws. And as computing power has increased,
these vulnerabilities have worsened. Despite efforts to improve WEP, it’s still
vulnerable to security breaches. The Wi-Fi Alliance officially retired WEP in 2004.
WEP
• Pros:
• Better than no security protocol — though not by much
• Cons:
• Riddled with security vulnerabilities
• Only 64-bit and 128-bit keys for encryption
• Fixed-key encryption
• Hard to configure
WPA
• ADV
• Addresses security vulnerabilities of the original wireless security standard, WEP
• TKIP encryption method is better than the fixed-key encryption used by WEP
• 256-bit key for encryption
• Cons:
• When rolled out onto WEP devices, TKIP can be exploited
• Similar security vulnerabilities to WEP
WAP 2
• WPA2 (Wi-Fi Protected Access 2) is the second generation of the Wi-Fi Protected
Access wireless security protocol. Like its predecessor, WPA2 was designed to secure
and protect Wi-Fi networks. WPA2 ensures that data sent or received over your
wireless network is encrypted, and only people with your network password have
access to it.
• A benefit of the WPA2 system was that it introduced the Advanced Encryption System
(AES) to replace the more vulnerable TKIP system used in the original WPA protocol.
Used by the US government to protect classified data, AES provides strong
encryption.
• Unfortunately, like it’s predecessor, WPA2-enabled access points (usually routers) are
vulnerable to attacks through WEP. To eliminate this attack vector, disable WEP and, if
possible, make sure your router’s firmware doesn’t rely on WEP.
WAP 2
• Pros:
• Addresses many security flaws of its predecessors
• Uses the strongest encryption method: AES
• Required by the Wi-Fi Alliance for use on all Wi-Fi certified products
• 256-bit key for encryption
• Cons:
• Still contains some security vulnerabiliLITES
WAP 3
• WPA3 (Wi-Fi Protected Access 3) is the newest wireless security protocol designed
to encrypt data using a frequent and automatic encryption type called Perfect
Forward Secrecy. It’s more secure than its predecessor, WPA2, but it hasn’t been
widely adopted yet. Not all hardware supports WPA3 automatically, and using this
protocol often requires costly upgr
KEY DIFFERNCE
• WEP protocol was released in 1999.
• WPA also called WiFi Protected Access was released in 2003
• WPA2 standard was ratified by IEEE in 2004
• WPA3 was released in 2018
SUPPORTED AUTHENTICATION
• WEP supports two authentication methods, Open System authentication
and Shared Key authentication.
• WPA uses pre-shared key and 802.1x authentication, which are more secure than
64-bit and 128-bit keys used by WEP.
• WPA2 is currently the most secure standard utilizing AES and a pre-shared key for
authentication.
• WPA3 uses Simultaneous Authentication of Equals (SAE) to provide stronger
defenses against password guessing.
SUPPORTED ENCRYPTION
• WEP encrypts traffic using RC4 stream cypher.
• WPA uses RC4 but adds longer 256-bit keys to encrypt data.
• WPA2 replaces RC4 and TKIP with CCMP and AES algorithm for stronger
encryption.
• WPA3 uses Advanced Encryption Standard mechanism for encryption.
KEY MANAGEMENT
• WEP has not got any features.
• WPA uses four way handshake mechanism.
• WPA2 also uses four way handshake mechanism.
• WPA3 uses Simultaneous Auhtentication of Equals handshake mechanism.
SUPPORTED CIPHER TYPE
• WEP and WPA uses stream cipher while WPA2 and WPA3 uses block cipher type.
Session Key Size
• WEP uses a shared secret key, which is 40 bits in length.
• WPA and WPA2 uses 128 bit session key.
• WPA3 uses 128 bit for personal use and 192 bit for enterprise use.
• Thank you for reading WEP vs WPA vs WPA2 vs WPA3 – WiFi Security Protocols
COMPARATIVE 2
COMPARATIVE 2

More Related Content

Similar to WEP .WAP WAP2.pptx

Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are youMarcus Dempsey
 
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi AP
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi APEmbedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi AP
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi APAhmed El-Arabawy
 
Wireless security837
Wireless security837Wireless security837
Wireless security837mark scott
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2Tushar Anand
 
Security standard
Security standardSecurity standard
Security standardlyndyv
 
Talk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2bTalk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2bSylvain Martinez
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedIRJET Journal
 
WPA3 - What is it good for?
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?Tom Isaacson
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting Shah Sheikh
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan finalPREMKUMAR
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected accessLopamudra Das
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-accessbhanu4ugood1
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
802 11 3
802 11 3802 11 3
802 11 3rphelps
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Mohammad Fareed
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...cmstiernberg
 

Similar to WEP .WAP WAP2.pptx (20)

Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are you
 
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi AP
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi APEmbedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi AP
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi AP
 
Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
 
Wireless security837
Wireless security837Wireless security837
Wireless security837
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2
 
Security standard
Security standardSecurity standard
Security standard
 
Talk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2bTalk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2b
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be Jeopardized
 
WPA3 - What is it good for?
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?
 
WEP
WEPWEP
WEP
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Wifi vignan final
Wifi vignan finalWifi vignan final
Wifi vignan final
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-access
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
802 11 3
802 11 3802 11 3
802 11 3
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018
 
WPA-3: SEA and Dragonfly
WPA-3: SEA and DragonflyWPA-3: SEA and Dragonfly
WPA-3: SEA and Dragonfly
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 

WEP .WAP WAP2.pptx

  • 1. WEP -WAP - WAP2
  • 2. WEP • WEP (Wired Equivalent Privacy) is the oldest and most common Wi-Fi security protocol. It was the privacy component established in the IEEE 802.11, a set of technical standards that aimed to provide a wireless local area network (WLAN) with a comparable level of security to a wired local area network (LAN). • The Wi-Fi Alliance ratified WEP as a security standard in 1999. Once touted to offer the same security benefits as a wired connection, WEP has been plagued over the years by many security flaws. And as computing power has increased, these vulnerabilities have worsened. Despite efforts to improve WEP, it’s still vulnerable to security breaches. The Wi-Fi Alliance officially retired WEP in 2004.
  • 3. WEP • Pros: • Better than no security protocol — though not by much • Cons: • Riddled with security vulnerabilities • Only 64-bit and 128-bit keys for encryption • Fixed-key encryption • Hard to configure
  • 4. WPA • ADV • Addresses security vulnerabilities of the original wireless security standard, WEP • TKIP encryption method is better than the fixed-key encryption used by WEP • 256-bit key for encryption • Cons: • When rolled out onto WEP devices, TKIP can be exploited • Similar security vulnerabilities to WEP
  • 5. WAP 2 • WPA2 (Wi-Fi Protected Access 2) is the second generation of the Wi-Fi Protected Access wireless security protocol. Like its predecessor, WPA2 was designed to secure and protect Wi-Fi networks. WPA2 ensures that data sent or received over your wireless network is encrypted, and only people with your network password have access to it. • A benefit of the WPA2 system was that it introduced the Advanced Encryption System (AES) to replace the more vulnerable TKIP system used in the original WPA protocol. Used by the US government to protect classified data, AES provides strong encryption. • Unfortunately, like it’s predecessor, WPA2-enabled access points (usually routers) are vulnerable to attacks through WEP. To eliminate this attack vector, disable WEP and, if possible, make sure your router’s firmware doesn’t rely on WEP.
  • 6. WAP 2 • Pros: • Addresses many security flaws of its predecessors • Uses the strongest encryption method: AES • Required by the Wi-Fi Alliance for use on all Wi-Fi certified products • 256-bit key for encryption • Cons: • Still contains some security vulnerabiliLITES
  • 7. WAP 3 • WPA3 (Wi-Fi Protected Access 3) is the newest wireless security protocol designed to encrypt data using a frequent and automatic encryption type called Perfect Forward Secrecy. It’s more secure than its predecessor, WPA2, but it hasn’t been widely adopted yet. Not all hardware supports WPA3 automatically, and using this protocol often requires costly upgr
  • 8. KEY DIFFERNCE • WEP protocol was released in 1999. • WPA also called WiFi Protected Access was released in 2003 • WPA2 standard was ratified by IEEE in 2004 • WPA3 was released in 2018
  • 9. SUPPORTED AUTHENTICATION • WEP supports two authentication methods, Open System authentication and Shared Key authentication. • WPA uses pre-shared key and 802.1x authentication, which are more secure than 64-bit and 128-bit keys used by WEP. • WPA2 is currently the most secure standard utilizing AES and a pre-shared key for authentication. • WPA3 uses Simultaneous Authentication of Equals (SAE) to provide stronger defenses against password guessing.
  • 10. SUPPORTED ENCRYPTION • WEP encrypts traffic using RC4 stream cypher. • WPA uses RC4 but adds longer 256-bit keys to encrypt data. • WPA2 replaces RC4 and TKIP with CCMP and AES algorithm for stronger encryption. • WPA3 uses Advanced Encryption Standard mechanism for encryption.
  • 11. KEY MANAGEMENT • WEP has not got any features. • WPA uses four way handshake mechanism. • WPA2 also uses four way handshake mechanism. • WPA3 uses Simultaneous Auhtentication of Equals handshake mechanism.
  • 12. SUPPORTED CIPHER TYPE • WEP and WPA uses stream cipher while WPA2 and WPA3 uses block cipher type. Session Key Size • WEP uses a shared secret key, which is 40 bits in length. • WPA and WPA2 uses 128 bit session key. • WPA3 uses 128 bit for personal use and 192 bit for enterprise use. • Thank you for reading WEP vs WPA vs WPA2 vs WPA3 – WiFi Security Protocols