(240)-343-2585

Hello, I am looking for someone to write an article on WEP KEY and Its Vulnerabilities. It needs to be at least 1250 words. Wired Equivalent Privacy makes the WLAN secure, and its role incorporates authentication and encryption of the wireless adapters on the network. It can be applied to the wireless devices at the data-link layer. The encryption algorithm in the WEP is the RC4. This paper analyses the working, algorithm and structure used in the WEP protocol. It also seeks to analyze the loopholes that attackers can access to bypass the wireless network, WEP. The paper as well aims to come up with proactive measures that can be incorporated to ensure the wireless networks stay safe and be attack-proof in this age of increased cases of cyber threats (Geier, 2002)