TITLE

On the way: 802.11i and WPA2

AUTHOR(S)
Burns, Jim
PUB. DATE
June 2004
SOURCE
Communications News;Jun2004, Vol. 41 Issue 6, p33
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
802.11i is the latest standard for 802.11-based wireless LAN security. Wi-Fi protected access 2 (WPA2) is the Wi-Fi Alliance certification program, based on the support by equipment and software for what it considers to be mandatory features of 802.11i. The features in IEEE 802.11i and WPA2 are virtually identical. The two most important features beyond WPA to become standardized through 802.11i/WPA2 are pre-authentication, which enables secure fast roaming without noticeable signal latency, and the use of a cipher suite in place of temporal key integrity protocol. Although 802.11i and WPA2 are basically the same, they provide for some differences due to their respective roles in the industry. This means there are minor differences in the total set of mandatory features. Ratification of 802.11i is expected to occur in 2004. WPA2 will go public shortly thereafter. Certification testing will begin soon after the 802.11i standard is ratified by IEEE. This will be an initial, non-mandatory testing period, to be followed in 18 months by the mandatory testing program.
ACCESSION #
13357152

 

Related Articles

  • A Survey of Wireless Security. Prodanović, Radomir; Simić, Dejan // Journal of Computing & Information Technology;Sep2007, Vol. 15 Issue 3, p237 

    Constant increase in use of wireless infrastructure networks for business purposes created a need for strong safety mechanisms. This paper describes WEP (Wired Equivalent Privacy) protocol for the protection of wireless networks, its security deficiencies, as well as the various kinds of attacks...

  • Level One WAP-0003.  // Australian Personal Computer;May2004, Vol. 24 Issue 5, p70 

    Security is a big concern for both network administrators and first-time users, and the Level One Wireless Access Protocol (WAP)-0003's approach to security is impressive. This access point supports 128-bit wired equivalent privacy encryption, as well as the ability to turn off service set...

  • Is "wireless security" an oxymoron? Sutton, Michael // Communications News;Jul2003, Vol. 40 Issue 7, p48 

    Discusses the importance of securing wireless networks. Elements of a secure Wi-Fi network; Reason that Wi-Fi has achieved market penetration in 2001 and 2002; Description of wired equivalent privacy.

  • Kaspersky Wi Fi Survey.  // Software World;Jul2007, Vol. 38 Issue 4, p25 

    The article reports on the release of the results of a survey conducted by Kaspersky Lab on wireless network security in Great Britain. Alexander Gostev, a senior virus analyst at Kaspersky Lab, investigated more than 800 WiFi hotspots in London's business districts in April 24-26, 2007. The...

  • 802.11w fills wireless security holes. Epstein, Joe // Network World;4/3/2006, Vol. 23 Issue 13, p29 

    This article describes the IEEE 802.11w, a wireless local area network (WLAN) security standard from the Institute of Electrical and Electronics Engineers. 802.11w extends the 802.11i standard's data encryption and public key cryptography algorithms to protect management frames from forgery and...

  • Wi-Fi Security Still Spotty. Captain, Seán // PCWorld;Aug2004, Vol. 22 Issue 8, p28 

    This article focuses on issues on wireless fidelity (Wi-Fi) security. New Wi-Fi-certified 802.11g wireless products promise better protection from snoops with the Wi-Fi Protected Access (WPA) encryption technology. In informal tests with a half dozen Wi-Fi access points and 14 internal and...

  • Companies clamping down on wireless workers who bypass encryption. Davies, Phil // Workforce Management;Dec2003, Vol. 82 Issue 13, p69 

    Focuses on the effort of some U.S. organizations to deploy wireless fidelity (Wi-Fi) connections in their quest for a higher productivity and a more managed workforce. Consequences of making employees take Wi-Fi policies; Benefits from Wi-Fi deployments at U.S. companies; Risks posed by Wi-Fi,...

  • Enabling Roaming in Heterogeneous Multi-Operator Wireless Networks. Gaitán, Oscar Salazar; Martins, Philippe; Demerjian, Jacques; Tohmé, Samir // Journal of Communications;Jun2007, Vol. 2 Issue 4, p18 

    Next generation wireless networks will take advantage of the popularity and the data rates offered by unlicensed wireless networks to enhance cellular services. Nowadays, it is not surprising to see heterogeneous wireless networks coexisting on a daily basis i.e. UMTS, WiFi, and WiMAX....

  • Attack Robustness and Security Enhancement with Improved Wired Equivalent Protocol. Ahmad, S. M. K. M. Abbas; Rajan, E. G.; Govardhan, A. // International Journal of Network Security (2152-5064);Apr2012, Vol. 3 Issue 2, p42 

    With the widespread use of wireless networks, securing Data transmission becomes a basic requirement. The IEEE 802.11 standard which defines wireless networks communication, has proposed in its second version, IEEE 802.11b, a new protocol to offer some wired-like security services, such as: data...

Share

Other Topics