Feeds

Secure the Wireless Network firmware

Intel WEP Schlep

  • alert
  • submit to reddit

Providing a secure and efficient Helpdesk

Intel Developer Forum Security issues surrounding wireless networking can be addressed without upgrading hardware, Intel said today.

The future ubiquity of wireless networking has been a key theme of the IDF this week, with much talk of a mobile computing future where laptop computers automatically select the best connection via either a wireless LAN or high-speed mobile network.

This is an attractive vision but there's serious concerns that recently released tools, such as Airsnort, will expose the insecurity of wireless networks, particularly since the security of installed networks has repeatedly been described to us as "flaky".

Encryption experts, among them Adi Shamir, the co-inventor of RSA, have highlighted cryptographic weaknesses in the WEP (Wired Equivalent Protocol) security that ships with 802.11b. Best practice calls for the use of virtual private networking techniques to encrypt data flowing over wireless Lans but this is often not followed.

Carol Jacobson, manager of Intel's wireless initiative, said weaknesses in WEP can be addressed by upgrading the firmware on existing kit and won't entail a forklift upgrade of kit (just better key management technology).

The next generation 802.11i standard for wireless networking will provide a long-term solution, she added.

Another concern raised during a panel on client initiatives at IDF was fears about interference arising from the number of different technologies using the 2.4GHz band. Bluetooth devices, 802.11b wireless networking kit, some US mobile operators and even devices from Radio Shack designed to pipe TV signals through the home use the over-occupied band.

According to Jackson, Bluetooth devices and 802.11b wireless equipment do not interfere with each other in airport environments and the like, where their use is emerging. However she admitted a few devices in the IDF technology showcase had "stepped on each other". Hmmm.®

Related IDF Stories

Intel goes bananas over Banias
2GHz P4 will turn us all into DJs
Wintel touts the next leap in computing
Project Jackson breaks cover - Xeon in 2002, Itanic later
McKinley, Deerfield speeds and feeds

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.