As you go down the list, you are getting less security for your network.īoth WPA and WPA2 are supposed to secure wireless Internet networks from unauthorized access. The best way to go is to deactivate Wi-Fi Protected Setup (WPS) and set the router to WPA2 +AES.
WPA, just like WEP, after being put through proof-of-concept and applied public demonstrations turned out to be pretty vulnerable to intrusion.
WPA was a significant enhancement over WEP, but as the core components were made so they could be rolled out through firmware upgrades on WEP-enabled devices, they still relied onto exploited elements. WPA Enterprise uses an authentication server for keys and certificates generation. Most modern WPA applications use a pre-shared key (PSK), most often referred to as WPA Personal, and the Temporal Key Integrity Protocol or TKIP (/tiːˈkɪp/) for encryption. One year before WEP was officially abandoned, WPA was formally adopted. For the time the 802.11i wireless security standard was in development, WPA was used as a temporary security enhancement for WEP.