Telecoms, Datacoms, Wireless, IoT


WPA - will it plug 'wireless' security holes?

5 November 2003 Telecoms, Datacoms, Wireless, IoT

Security still remains a major obstacle in the successful implementation of wireless LANs. Past efforts to solve this, have not been entirely successful. There is, however, a new security mechanism set to change this. In this article, Graham Vorster, chief technology officer of Duxbury Networking, discusses the benefits of the recently introduced WPA technology.

Since the inception of wireless technology, security has been a major concern and inhibitor of widespread industry adoption.

The wireless LAN industry's first crack at security - 802.11 wireless equivalent privacy [WEP] has already - though somewhat prematurely - been branded as a failure. Jim Geier, author of 'Wireless LANs', recently commented that WEP is so easy to break it is like having a plastic lock on your door.

"Although WEP can keep casual snoopers from accessing a wireless LAN, companies need and can do much better," he says.

One of the key flaws of WEP is that its encryption keys are static rather than dynamic. The problem with this scenario is that once an IT administrator wants to update the keys, he or she has to visit each machine, which is not feasible when dealing with a big network.

Introducing WPA

At the end of last year, the Wireless Fidelity (Wi-Fi) Alliance announced Wi-Fi Protected Access (WPA), a standards-based security mechanism that eliminates most 802.11 security issues.

Based on the still to be ratified 802.11i standard, WPA will be integrated into products within the next few months.

According to the Wi-Fi Alliance, one of the key advantages of WPA is that it enables the implementation of open wireless LAN security in public areas and hot spots such as universities - this has in the past not been possible with WEP.

And to demonstrate just how serious they are about the implementation of WPA, the Wi-Fi Alliance has mandated that by the end of this year the security mechanism will be a requirement for all new Wi-Fi certifications.

How WPA works

WPA features both temporal key integrity protocol [TKIP] and 802.1x mechanisms, which provide dynamic key encryption and mutual authentication for mobile clients.

Unlike WEP, it counters hacker intrusions by generating periodic and unique encryption keys for each of its users.

Companies can, for example, use WPA to interface with an authentication server, such as RADIUS [remote authentication dial-in user service] using 802.1x with EAP.

However, in the case of SOHOs [small office, home office] WPA does not require an authentication server, due to the technology's ability to operate in 'preshared key mode'.

Similar to WEP, a user's preshared key must match the one stored at the access point. An access point then uses the preshared key for authentication. If the key matches, access is given to the wired side of the access point.

Who will benefit from WPA?

It is believed that WPA will benefit legacy equipment the most. Companies can install it via software upgrades to Wi-Fi certified access points. These access points will then support a mixed environment of client devices, ones implementing WPA and others that do not.

But, one of the key benefits of WPA is that it is forward compatible with the 802.11i standard. When finally ratified, this standard will include advanced encryption standards (AES) as an option, which is said to be stronger that RC4.

One downfall of AES is that it will probably require the replacement of a legacy point because of the need for higher performing processors. 802.11i will, therefore, be targeted at new equipment.

Undoubtedly WPA is not an interim solution but a long-term step. It is set to provide excellent security and can already be implemented on existing technology.

With the new hardware requirements of 802.11i, WPA is likely to be the solution that lasts until you move to the next generation of hardware.

For more information contact Graham Vorster, Duxbury Networking, 011 646 3323, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Industrial Ethernet time sensitive networking switch
RS South Africa Telecoms, Datacoms, Wireless, IoT
The ADIN3310 and ADIN6310 are 3-port and 6-port Gigabit Ethernet time sensitive networking (TSN) switches with integrated security primarily designed for industrial Ethernet applications.

Read more...
When it comes to long-term reliability of RF amplifier ICs, focus first on die junction temperature
Altron Arrow Editor's Choice Telecoms, Datacoms, Wireless, IoT
When considering the long-term reliability of integrated circuits, a common misconception is that high package or die thermal resistance is problematic. However, high or low thermal resistance, by itself, tells an incomplete story.

Read more...
Automotive-grade digital isolators
Telecoms, Datacoms, Wireless, IoT
The NSI83xx series of capacitive-based isolators from NOVOSENSE Microelectronics offer superior EOS resilience and minimal power noise susceptibility.

Read more...
Why bis means business for LTE Cat 1 IoT connections
NuVision Electronics Editor's Choice Telecoms, Datacoms, Wireless, IoT
Tomaž Petaros, product manager IoT EMEA at Quectel Wireless Solutions explains why the market for Cat 1bis IoT connections is getting busy.

Read more...
Wi-Fi in 2025: When is Wi-Fi 7 the answer?
iCorp Technologies Telecoms, Datacoms, Wireless, IoT
Wi-Fi 7 introduces multi-link operation and lower latency, a game-changing feature that allows devices to transmit and receive data across multiple frequency bands simultaneously to significantly reduce network congestion.

Read more...
Bluetooth Lite SoCs purpose built for IoT
NuVision Electronics Telecoms, Datacoms, Wireless, IoT
Whether it is enabling predictive maintenance on industrial equipment, tracking assets in dense environments, or running for years on a coin cell battery in ultra-low power sensors, developers need solutions that are lean, reliable, and ready to scale with emerging use cases.

Read more...
LTE Cat 1bis module
Otto Wireless Solutions Telecoms, Datacoms, Wireless, IoT
The A7673X LTE Cat 1bis module from SimCom is engineered to meet the growing demands of the IoT industry, offering exceptional performance and seamless integration.

Read more...
Track with precision
Electrocomp Telecoms, Datacoms, Wireless, IoT
KYOCERA AVX provides innovative antennas for cellular, LTE-M, NB-IoT, LoRa, GNSS, BLE, UWB, Wi-Fi, and future Satellite IoT.

Read more...
Wi-Fi 7 front-end module
RF Design Telecoms, Datacoms, Wireless, IoT
The Qorvo QPF4609 is an integrated front end module designed for 802.11be systems that has integrated matching, which minimises layout area.

Read more...
Multi-channel downconverter
Vepac Electronics Telecoms, Datacoms, Wireless, IoT
The Downconverter from Crane Aerospace is a converter that operates from 2 to 18 GHz and delivers a noise figure of 11 dB with an attenuation range of 25 dB.

Read more...