Problem
A. What is the fundamental difference between WEP and CCMP in terms of user data confidentiality?
B. Why has 802.11i defined the TKIP protocol in addition to CCMP?
C. In 802.1X authentication, by which entity (an access point or an authentication server) the station is authenticated?
D. Explain the process of how a station and the network authenticate each other in 802.1X?
E. In TKIP, does the attacker know a part of the RC4 key by listening to the network and getting the TSC in 802.11 frames?
F. In summary, how does WPA improves the confidentiality and integrity of WEP?