All 802.11 WLAN products, whether they use a, b, g, or n radios, must comply with exactly the same 802.11 security...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
measures. Currently, those measures are defined by the IEEE 802.11i-2004 Amendment to the IEEE 802.11-1999 Standard -- Medium Access Control (MAC) Security Enhancements. So, technically, there should be no difference in security features found in 802.11a/b/g products and 802.11n products.
In practice, you will see some temporal differences between new and old products. For example, it is still possible to buy some old 802.11b products that support only the original WEP, and many not-so-old 802.11g products that support both WEP and WPA (an early snapshot of the 802.11i standard that used TKIP encryption). But the Wi-Fi Alliance now requires all new Wi-Fi certified products to support WPA2 (the final 802.11i standard that includes both TKIP and AES). So new 802.11n products (and pre-n products) certified by the Wi-Fi Alliance can all be expected to provide no less than full 802.11i security.
Another difference will be seen in related WLAN analysis, monitoring, and prevention products used to detect and respond to security incidents. Existing products that use a/b/g cards, decode engines, and analysis modules will need to be upgraded to hear, parse, and analyze 802.11n transmissions. If you don't upgrade your monitoring system, you may end up with a security "blind spot" when it comes to 802.11n or pre-n products.
Related Q&A from Lisa Phifer
The enterprise mobility management market for wearable devices is in its infancy, but IT can still use existing EMM tools to manage wearables.continue reading
Wireless expert Lisa A. Phifer explains to what extent WEP cracking remains a worrisome issue. It all depends on your company's WLAN security policy.continue reading
Wireless expert Lisa A. Phifer explains why you shouldn't stop using 802.1X authentication methods for enterprise WLAN access control.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.