WEP

WPA

WPA2

The main Purpose

Security is provided in contrast to wired networks

Implementation of major IEEE802.11i standards with WEP without requiring new hardware

Complete IEEE 802.11i standards are implemented with new enhancements of WPA

Data Privacy

(Encryption)

Rivest Cipher 4 (RC4)

Temporal Key Integrity Protocol (TKIP)

Authentication is provided through chipper blocks with CCMP and AES.

Authentication

WEP-Open and WEP-Shared

WPA-PSK and WPA-Enterprise

WPA2-Personal and WPA2-enterprise

Data Integrity

CRC-32

Data integrity is provided through Message Integrity Code.

Cipher block chaining message authentication code (CBC-MAC)

Key Management

Key management is not provided

The 4 way handshaking mechanism is used to provide for key management

The 4 way handshaking mechanism is used to provide for key management

Compatibility in terms of Hardware

Possible to deploy on current hardware infrastructure

Possible to deploy on both current and previous hardware

Older Network Interface Cards are not supported. Only the 2006 and newer.

Vulnerability

Vulnerable against Chopchop, Bittau’s fragmentation and DoS attacks including variety of DoS attacks.

Vulnerable against Chopchop, Ohigashi-Morii, WPA-PSK, and Dos attacks.

Vulnerable against DoS attacks due to unprotected control frames and MAC spoofing

Deployment in terms of complexity

Easy to deploy and configure

WPA-2 requires complicated setup with WPA enterprise.

Replay attack protection

No protection against replay attacks

Implements sequence counter for replay protection

Implementation of 48-bit datagram/packet number protects against replay attack