Security.com

Wired Equivalent Privacy (WEP)

By Peter Loshin

What is Wired Equivalent Privacy (WEP)?

Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b. That standard is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN.

The WEP protocol was introduced in 1997 but was plagued by several security issues. Standards bodies began discouraging its use in the early 2000s, as more effective standards were introduced.

WEP attempted to limit access to wireless network data in the same way wired local area networks (LANs) protect data. Users with physical access to the network access points are the only ones with access to wired networks. Wireless networks like Wi-Fi depend on encryption protocols like WEP to prevent unauthorized access to network data.

Physical security mechanisms protect a wired LAN to some degree. For example, controlled access to a building prevents outsiders from walking in and plugging their devices into the LAN. Outsiders can gain access to WLANs via the radio waves that connect to the network.

How does WEP work?

The Wired Equivalent Privacy protocol adds security similar to a wired network's physical security by encrypting data transmitted over the WLAN. Data encryption protects the vulnerable wireless link between clients and access points.

After WEP secures wireless data transmissions, other LAN security mechanisms can ensure privacy and data confidentiality. These include password protection, end-to-end encryption, virtual private networks and authentication.

The basic network security services the protocol provides for wireless networks include the following:

Drawbacks to Wired Equivalent Privacy

WEP is widely implemented and deployed, but it suffers from serious security weaknesses. These include:

These weaknesses doomed WEP. Most standards bodies deprecated the protocol soon after the Wi-Fi Protected Access (WPA) protocol became available in 2003.

WEP vs. WPA

The IEEE introduced Wired Equivalent Privacy in the 802.11 wireless networking standard in 1997 and then released WPA as a proposed replacement five years later. Efforts to fix WEP during its short lifetime failed to produce a secure solution to wireless network access. WPA2 formally replaced it in 2004.

WEP variants and improved versions of WPA include the following protocols:

How is WEP used?

Wireless hardware manufacturers implemented WEP in hardware, which meant updates to the security protocol had to fit into the flash memory of wireless network interface cards and network access point devices. This limited the scope of improvements that were possible with WEP and WPA. It also meant systems using older hardware could be vulnerable to well-known attacks.

Given the widespread deployment of inexpensive wireless devices and access points, WEP is still being used and will continue to be used until the obsolete hardware is retired. That means networking and IT professionals should be vigilant in identifying and replacing these obsolete devices.

Learn more about the protocols used to secure wireless networks in this overview of WLAN security standards.

27 Aug 2021

All Rights Reserved, Copyright 2000 - 2024, TechTarget | Read our Privacy Statement