Feeds

Wi-Fi Alliance to beef up security

Key issue for users

  • alert
  • submit to reddit

Security for virtualized datacentres

Security remains the key issue deterring enterprise users from making major investments in Wi-Fi, despite all the improvements over the past year. Whether real or perceived, the security risks of wireless LANs are still holding deployments back. Conscious of this, the Wi-Fi Alliance is trying to beef up standard security still further.

It has already agreed to a dual-layer security approach, with WPA2 (the brand name for the 802.11i standard) supporting advanced functions including AES encryption, while the more basic WPA – originally an interim standard en route to 802.11i – will be kept for devices that require less stringent security and lower costs, particularly in the consumer space.

Now the group intends, for WPA2, to enforce a higher level of encryption, reiterating a decision it tentatively made last autumn to require 64-character passwords. This move was in response to a spate of rogue access point attacks and new question marks over Wi-Fi’s resistance to hackers.

It is even possible that the ‘lite’ version of WPA will be dropped later this year, making it compulsory even for consumer devices to support WPA2 in order to be certified as Wi-Fi compatible.

The risk of a very stringent requirement is that vendors at the budget end of the market bypass testing and certification altogether and so undermine the Wi-Fi Alliance’s brand. Many consumers have been found to recognize generic terms such as wireless LAN, and individual brands such as Centrino, more than the term Wi-Fi, so it can be argued that Wi-Fi certification is not essential to success in the home market.

Craig Mathias, an analyst at Farpoint Group believes in keeping the two-tier system. "I don't think everyone will need AES. I also think higher level security of the 802.1x or VPN variety can effectively substitute for AES in many cases,” he said. Throughout this year, the Alliance will be adding various strains of EAP (Extensible Authentication Protocol) to its testbed. As the Wi-Fi community seeks to instil confidence in its technologies,

WiMAX will face the same challenges once certified equipment starts to become available late this year. Although the 802.16 standards have far greater security functionality built into the base than Wi-Fi did, the perception of their safety will have to be high before they win the trust of enterprise and carrier users. Terabeam, which is developing WiMAX-ready equipment, is one company that believes there are significant security gaps to be filled in 802.16-2004. In particular, it claims WiMAX’ authentication facilities are limited and its encryption method, DES 3, is less robust than AES. A combination of standards activity – particularly with an eye to government customers – and third party enhancements will be essential for commercial WiMAX products to pass the grade. Already, Intel has submitted proposals for incorporating AES into 802.16 too.

Authentication, based on X.509 digital certificates, is included in the media access control layer and gives every 802.16 customer transceiver its own built-in certificate, plus one for the manufacturer, allowing the base station to authorize the end user. Link privacy is implemented as part of another MAC sublayer, the privacy sublayer. It is based on the Privacy Key Management protocol that is part of the DOCSIS BPI+ specification.

As in other standards, many advances will come from individual vendors, whether enhancements that differentiate an individual product, or work that may be fed back into the standards process. One example is Airspan’s work with Hifn, a specialist maker of security coprocessors. In December, Airspan said it would use its partner’s 7955 coprocessor in its base stations as “a suitable encryption solution for IEEE 802.16-2004, that would also be able to support the evolving 802.16e standard”.

The Hifn 7955 is designed for networking applications like virtual private networking (VPN) broadband routers, wireless access points, VPN edge router/gateways, firewall/VPN appliances, and other network and customer premise equipment. It accelerates a variety of IPsec and SSL/TLS protocols including DES, 3 DES, AES and public key. In addition to IPsec and SSL protocols, it also supports the temporal key integrity protocol (TKIP) and AES counter mode encryption.

Although WiMAX may be inherently more secure than its local area cousin, such enhancements will be important if its uptake is not to be delayed, like Wi-Fi’s, by lack of user confidence. In the end, this will be a more important factor in the speed of adoption of 802.16 than the much publicized delays in equipment certification.

Copyright © 2004, Wireless Watch

Wireless Watch is published by Rethink Research, a London-based IT publishing and consulting firm. This weekly newsletter delivers in-depth analysis and market research of mobile and wireless for business. Subscription details are here.

Related stories

Business frets over wireless security
Major telcos tout Wi-Fi roaming pact
Wi-Fi Alliance certifies first converged kit

Secure remote control for conventional and virtual desktops

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
'Serious flaws in the Vertigan report' says broadband boffin
Report 'fails reality test' , is 'simply wrong' and offers ''convenient' justification for FTTN says Rod Tucker
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
Apple Watch will CONQUER smartwatch world – analysts
After Applelocalypse, other wristputers will get stuck in
Shades of Mannesmann: Vodafone should buy T-Mobile US
Biting the bullet would let Blighty-based biz flip the bird at AT&T
Drag queens: Oh, don't be so bitchy, Facebook! Let us use our stage names
Handbags at dawn over free content ad network's ID policy
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.