Wifi Protected Setup (WPS)
WPS is a wireless network security standard that aims to make connections between routers and wireless devices faster and easier. WPS is only compatible with wireless networks that use a password protected by the Wifi Protected Access Personal (WPA) or Wifi Protected Access2 (WPA2) Personal security protocols. WPS does not work on wireless networks that use the detested Wired Equivalent Privacy (WEP) security, which can be easily cracked by any hacker with basic skills.
In a typical configuration, you need to know the network name (also known as the Service Set Identifier (SSID)) and password in order to connect a wireless device to a wireless network (also called WPA-PSK key). You must first select the network you want to connect to and then enter its security password on your device if you want to connect a device, such as your smartphone or laptop, to your wireless network.
How can WPS help?
Sometimes the connection process can be made simpler by WPS. The following describes how to make a WPS connection:
The first two methods are quick, whereas the last two methods offer no advantages in terms of how quickly devices connect to your wireless network. It is necessary to type the eight-digit PIN, and typing the wireless network password takes too long. The fourth method of connecting to a wireless network is even slower because the client device's PIN must be entered and the wireless configuration section of the router must be accessed.
Benefits of WPS -
WPS drawbacks include:
The WPS protocol relies on an exchange of descriptive information that should take place before the user's action to initiate a series of EAP message exchanges. A new Information Element (IE) is added to the beacon, probe response, and, optionally, the probe request and association request/response messages to carry the descriptive information. In addition to type-length values that are purely informative, those IEs will also contain information about the device's potential and current configuration options.
After this exchange of information about each end's device capabilities, the user starts the actual protocol session. The session consists of eight messages, and if the session is successful, a message signalling the end of the protocol follows. When using different physical media or configuring different types of devices (AP or STA), the precise stream of messages may vary (wired or wireless).