Feeds

Wi-Fi Alliance to beef up security

Key issue for users

  • alert
  • submit to reddit

The smart choice: opportunity from uncertainty

Security remains the key issue deterring enterprise users from making major investments in Wi-Fi, despite all the improvements over the past year. Whether real or perceived, the security risks of wireless LANs are still holding deployments back. Conscious of this, the Wi-Fi Alliance is trying to beef up standard security still further.

It has already agreed to a dual-layer security approach, with WPA2 (the brand name for the 802.11i standard) supporting advanced functions including AES encryption, while the more basic WPA – originally an interim standard en route to 802.11i – will be kept for devices that require less stringent security and lower costs, particularly in the consumer space.

Now the group intends, for WPA2, to enforce a higher level of encryption, reiterating a decision it tentatively made last autumn to require 64-character passwords. This move was in response to a spate of rogue access point attacks and new question marks over Wi-Fi’s resistance to hackers.

It is even possible that the ‘lite’ version of WPA will be dropped later this year, making it compulsory even for consumer devices to support WPA2 in order to be certified as Wi-Fi compatible.

The risk of a very stringent requirement is that vendors at the budget end of the market bypass testing and certification altogether and so undermine the Wi-Fi Alliance’s brand. Many consumers have been found to recognize generic terms such as wireless LAN, and individual brands such as Centrino, more than the term Wi-Fi, so it can be argued that Wi-Fi certification is not essential to success in the home market.

Craig Mathias, an analyst at Farpoint Group believes in keeping the two-tier system. "I don't think everyone will need AES. I also think higher level security of the 802.1x or VPN variety can effectively substitute for AES in many cases,” he said. Throughout this year, the Alliance will be adding various strains of EAP (Extensible Authentication Protocol) to its testbed. As the Wi-Fi community seeks to instil confidence in its technologies,

WiMAX will face the same challenges once certified equipment starts to become available late this year. Although the 802.16 standards have far greater security functionality built into the base than Wi-Fi did, the perception of their safety will have to be high before they win the trust of enterprise and carrier users. Terabeam, which is developing WiMAX-ready equipment, is one company that believes there are significant security gaps to be filled in 802.16-2004. In particular, it claims WiMAX’ authentication facilities are limited and its encryption method, DES 3, is less robust than AES. A combination of standards activity – particularly with an eye to government customers – and third party enhancements will be essential for commercial WiMAX products to pass the grade. Already, Intel has submitted proposals for incorporating AES into 802.16 too.

Authentication, based on X.509 digital certificates, is included in the media access control layer and gives every 802.16 customer transceiver its own built-in certificate, plus one for the manufacturer, allowing the base station to authorize the end user. Link privacy is implemented as part of another MAC sublayer, the privacy sublayer. It is based on the Privacy Key Management protocol that is part of the DOCSIS BPI+ specification.

As in other standards, many advances will come from individual vendors, whether enhancements that differentiate an individual product, or work that may be fed back into the standards process. One example is Airspan’s work with Hifn, a specialist maker of security coprocessors. In December, Airspan said it would use its partner’s 7955 coprocessor in its base stations as “a suitable encryption solution for IEEE 802.16-2004, that would also be able to support the evolving 802.16e standard”.

The Hifn 7955 is designed for networking applications like virtual private networking (VPN) broadband routers, wireless access points, VPN edge router/gateways, firewall/VPN appliances, and other network and customer premise equipment. It accelerates a variety of IPsec and SSL/TLS protocols including DES, 3 DES, AES and public key. In addition to IPsec and SSL protocols, it also supports the temporal key integrity protocol (TKIP) and AES counter mode encryption.

Although WiMAX may be inherently more secure than its local area cousin, such enhancements will be important if its uptake is not to be delayed, like Wi-Fi’s, by lack of user confidence. In the end, this will be a more important factor in the speed of adoption of 802.16 than the much publicized delays in equipment certification.

Copyright © 2004, Wireless Watch

Wireless Watch is published by Rethink Research, a London-based IT publishing and consulting firm. This weekly newsletter delivers in-depth analysis and market research of mobile and wireless for business. Subscription details are here.

Related stories

Business frets over wireless security
Major telcos tout Wi-Fi roaming pact
Wi-Fi Alliance certifies first converged kit

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
Microsoft unsheathes cheap Android-killer: Behold, the Lumia 530
Say it with us: I'm King of the Landfill-ill-ill-ill
All those new '5G standards'? Here's the science they rely on
Radio professor tells us how wireless will get faster in the real world
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
'Two-speed internet' storm turns FCC.gov into zero-speed website
Deadline for comments on net neutrality shake-up extended to Friday
Oh girl, you jus' didn't: Level 3 slaps Verizon in Netflix throttle blowup
Just hook us up to more 10Gbps ports, backbone biz yells in tit-for-tat spat
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.