2.1 WEP and MAC Filtering
The first attempts at providing some security toWiFi networks
were WEP and MAC Address Filtering. WEP utilizes
the RC4 stream cipher and manual key distribution
to provide data confidentiality and integrity. WEP’s weaknesses
have long been legendary [3, 11]. It is argued that
it is better than nothing and at least prevents casual attacks.
However, in the attack scenarios we present here it provides
no protection what so ever.