Feeds

Wi-Fi Alliance preps WPA 2 security spec

Full 802.11i coming at last?

  • alert
  • submit to reddit

Designing a Defense for Mobile Applications

The Wi-Fi Alliance yesterday said it will offer a second generation of its Wi-Fi Protected Access (WPA) security system later this year.

The Wi-Fi standards body also announced that more than 175 products have been certified as compatible with the first version of WPA.

Launched in mid-2003, WPA provides a rather higher level of data security across wireless networks than Wired Equivalent Privacy (WEP), the security system incorporated into the 802.11b standard.

WPA is not an IEEE standard per se, but it is a sub-set of the proposed 802.11i security standard currently being defined and agreed by the IEEE. In essence, WPA offers everything in 802.11i that doesn't require hardware acceleration - primarily its level of data encryption.

Initially an option, WPA certification is now a requirement for any Wi-Fi product to achieve Wi-Fi Alliance certification - and without that, no product can claim to be compatible with 802.11a, b or g.

WPA 2 isn't far off, and is likely to be simply how 802.11i is marketed. Having established WPA, why chuck all the brand awareness by naming the next version after the IEEE standard?

The Alliance expects products certified for WPA 2 to be available in the middle of 2004. ®

Related Products
Check out Wireless, 802.11 & WiFi products in The Reg mobile store

Securing Web Applications Made Simple and Scalable

More from The Register

next story
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
Google Nest, ARM, Samsung pull out Thread to strangle ZigBee
But there's a flaw in Google's IP-based IoT system
Orange spent weekend spamming customers with TXTs
Zero, not infinity, is the Magic Number customers want
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
'Two-speed internet' storm turns FCC.gov into zero-speed website
Deadline for comments on net neutrality shake-up extended to Friday
NBN Co execs: No FTTN product until 2015
Faster? Not yet. Cheaper? No data
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.