Feeds

Wi-Fi Alliance tries again on wireless security

WPA to succeed where WEP failed?

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

The Wi-Fi Alliance aims to make it easier to build robust security into wireless LANS with the announcement yesterday of a successor to the flawed WEP (Wired Equivalent Privacy) protocol.

Wi-Fi Protected Access (WPA) uses a higher level of encryption and brings in dynamic key exchange functions absent with WEP. WPA is designed to work with existing products and is expected to first appear in Wi-Fi certified products during the first quarter of next year.

Most vendors are expected to offer firmware and software updates for Wi-Fi certified products currently in use in order to bring in WPA. Use of the protocol will be mandatory in products certified by the Wi-Fi Alliance from August next year.

WPA is based on a subset of features found in the 802.11i Robust Security Network amendment to the existing wireless LAN standard.

802.11i is not expected to be ratified till the back end of next year and the industry can't afford to wait that long, Kirk Alchorne, European director at the Wi-Fi Alliance and an access product manager at Nokia, told us.

Alchorne was candid in admitting concerns about the security of wireless LANS were hold back deployment.

Virtual Private Networks offer a way to secure 802.11b or 802.11a wireless LANS but they impose a performance overhead and the approach is not suited to everyone, he said. Alchorne added that security appliances (from the likes of Bluesocket) or proprietary extensions to WEP fail to take interoperability and standardisation, hence the need for WPA.

WEP, which is relatively easy to circumvent using tools such as AirSnort, is often not used at all - as this week's second WorldWide WarDrive is expected to confirm. It is better than nothing, though, and the advice from the Wi-Fi Alliance is to continue to use WEP until WPA comes along.

Alchorne said that making WPA far easier to implement and more inherently secure than WEP will encourage wider deployment for WPA than its insecure predecessor every achieved. ®

Related Stories

RSA supplies answer to drive-by hacking?
Tool dumbs down wireless hacking
Rogue WLANS - the next security battlefield?
Wireless security is even flakier than we thought

External Links

FAQ on WPA

Choosing a cloud hosting partner with confidence

More from The Register

next story
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
The DRUGSTORES DON'T WORK, CVS makes IT WORSE ... for Apple Pay
Goog Wallet apparently also spurned in NFC lockdown
Cray-cray Met Office spaffs £97m on VERY AVERAGE HPC box
Only 250th most powerful in the world? Bring back Michael Fish
Microsoft brings the CLOUD that GOES ON FOREVER
Sky's the limit with unrestricted space in the cloud
'ANYTHING BUT STABLE' Netflix suffers BIG Europe-wide outage
Friday night LIVE? Nope. The only thing streaming are tears down my face
IBM, backing away from hardware? NEVER!
Don't be so sure, so-surers
Google roolz! Nest buys Revolv, KILLS new sales of home hub
Take my temperature, I'm feeling a little bit dizzy
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.