Telecoms, Datacoms, Wireless, IoT


WPA - will it plug 'wireless' security holes?

5 November 2003 Telecoms, Datacoms, Wireless, IoT

Security still remains a major obstacle in the successful implementation of wireless LANs. Past efforts to solve this, have not been entirely successful. There is, however, a new security mechanism set to change this. In this article, Graham Vorster, chief technology officer of Duxbury Networking, discusses the benefits of the recently introduced WPA technology.

Since the inception of wireless technology, security has been a major concern and inhibitor of widespread industry adoption.

The wireless LAN industry's first crack at security - 802.11 wireless equivalent privacy [WEP] has already - though somewhat prematurely - been branded as a failure. Jim Geier, author of 'Wireless LANs', recently commented that WEP is so easy to break it is like having a plastic lock on your door.

"Although WEP can keep casual snoopers from accessing a wireless LAN, companies need and can do much better," he says.

One of the key flaws of WEP is that its encryption keys are static rather than dynamic. The problem with this scenario is that once an IT administrator wants to update the keys, he or she has to visit each machine, which is not feasible when dealing with a big network.

Introducing WPA

At the end of last year, the Wireless Fidelity (Wi-Fi) Alliance announced Wi-Fi Protected Access (WPA), a standards-based security mechanism that eliminates most 802.11 security issues.

Based on the still to be ratified 802.11i standard, WPA will be integrated into products within the next few months.

According to the Wi-Fi Alliance, one of the key advantages of WPA is that it enables the implementation of open wireless LAN security in public areas and hot spots such as universities - this has in the past not been possible with WEP.

And to demonstrate just how serious they are about the implementation of WPA, the Wi-Fi Alliance has mandated that by the end of this year the security mechanism will be a requirement for all new Wi-Fi certifications.

How WPA works

WPA features both temporal key integrity protocol [TKIP] and 802.1x mechanisms, which provide dynamic key encryption and mutual authentication for mobile clients.

Unlike WEP, it counters hacker intrusions by generating periodic and unique encryption keys for each of its users.

Companies can, for example, use WPA to interface with an authentication server, such as RADIUS [remote authentication dial-in user service] using 802.1x with EAP.

However, in the case of SOHOs [small office, home office] WPA does not require an authentication server, due to the technology's ability to operate in 'preshared key mode'.

Similar to WEP, a user's preshared key must match the one stored at the access point. An access point then uses the preshared key for authentication. If the key matches, access is given to the wired side of the access point.

Who will benefit from WPA?

It is believed that WPA will benefit legacy equipment the most. Companies can install it via software upgrades to Wi-Fi certified access points. These access points will then support a mixed environment of client devices, ones implementing WPA and others that do not.

But, one of the key benefits of WPA is that it is forward compatible with the 802.11i standard. When finally ratified, this standard will include advanced encryption standards (AES) as an option, which is said to be stronger that RC4.

One downfall of AES is that it will probably require the replacement of a legacy point because of the need for higher performing processors. 802.11i will, therefore, be targeted at new equipment.

Undoubtedly WPA is not an interim solution but a long-term step. It is set to provide excellent security and can already be implemented on existing technology.

With the new hardware requirements of 802.11i, WPA is likely to be the solution that lasts until you move to the next generation of hardware.

For more information contact Graham Vorster, Duxbury Networking, 011 646 3323, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Power amps for portable radio comms systems
iCorp Technologies Telecoms, Datacoms, Wireless, IoT
CML Micro expands its SµRF product portfolio with a pair of high efficiency single- and two-stage power amplifiers that offer outstanding performance for a wide range of dual-cell lithium battery-powered wireless devices.

Read more...
RF agile transceiver
Altron Arrow Telecoms, Datacoms, Wireless, IoT
The AD9361 is a high performance, highly integrated RF Agile Transceiver designed for use in 3G and 4G base station applications.

Read more...
Choosing a GNSS receiver
RF Design Telecoms, Datacoms, Wireless, IoT
Applications requiring sub-ten-meter positioning accuracy today can choose between single-band or dual-band technology. While this decision might seem as simple as flipping a coin, it is far from that.

Read more...
Tri-Teq’s latest range of filters
RFiber Solutions Telecoms, Datacoms, Wireless, IoT
Tri-Teq recently presented its latest filter products, which included passive and co-site mitigation filters (lumped element and suspended substrate technologies) and tunable filters (bandpass and harmonic switched filters).

Read more...
Why GNSS positioning precision is enabling the next wave of IoT applications
iCorp Technologies Editor's Choice Telecoms, Datacoms, Wireless, IoT
While high-performance GNSS implementations are achievable with few limitations, most real-world applications must balance power consumption, form factor and accuracy requirements.

Read more...
The evolution of 4D imaging radar
Altron Arrow Telecoms, Datacoms, Wireless, IoT
4D imaging radar is redefining automotive sensing with unmatched precision, scalability and resilience and, as global adoption accelerates, this technology is poised to become a cornerstone of autonomous mobility.

Read more...
Links Field Networks: The perfect fit for telematics in Africa
Links Field Networks Telecoms, Datacoms, Wireless, IoT
Operating at the intersection of global SIM innovation and local market intelligence, Links Field Networks has emerged as a premier provider of telematics-oriented connectivity across Africa and beyond.

Read more...
RF direct conversion receiver
iCorp Technologies Telecoms, Datacoms, Wireless, IoT
The CMX994 series from CML Micro is a family of direct conversion receiver ICs with the ability to dynamically select power against performance modes.

Read more...
Bridging the future with RAKWireless WisNode devices
Otto Wireless Solutions Telecoms, Datacoms, Wireless, IoT
The WisNode Bridge series by RAKWireless is designed to convert traditional wired industrial protocols like RS485 and Modbus into LoRa-compatible signals.

Read more...
Mission-critical RF transceiver
Vepac Electronics Telecoms, Datacoms, Wireless, IoT
The Iris SQN9506 from Sequans Communications is a wide-band RF transceiver that operates from 220 MHz to 7,125 GHz.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved