Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    WPA To Whip Wireless Security into Shape

    Written by

    Larry Seltzer
    Published July 17, 2003
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Wired Equivalent Privacy, better known as WEP, has been one of the security industrys laughingstocks for years. However, a fix is in the works—again. Still, this time, the results look promising.

      While the WEP encryption standard is installed in zillions of Wi-Fi devices out on the market, its been common knowledge that cracking keys and breaking WEP encryption is not all that difficult. Theres even been a growing trade in tools to help you do this, not that I would approve of such things. Whats worse, the problems are at the protocol level, not in the implementations, meaning that WEP has been just plain broken

      The good news is that after some fits and starts, the standards and industry people in the Wi-Fi Alliance finally agreed on a solution, and so far nobodys come up with a serious flaw in it.

      Wi-Fi Protected Access (WPA) can be implemented on all Wi-Fi devices with just a software upgrade (assuming the device is software-upgradable, as any decent should be). It uses a far stronger encryption protocol called Temporal Key Integrity Protocol (TKIP), and includes a protocol for changing keys periodically just to make things even harder for attackers. Throw in the Message Integrity Code (MIC or “Michael”) and WPA packets also become hard to tamper with in the air.

      WPA is a subset 802.11i, a more ambitious standard that has been in the works for a while and given the new marketing moniker WPA2. 802.11i, or WPA2, will add support for a far stronger encryption method called Advanced Encryption Standard (AES), which has been adopted as an official government standard by the Department of Commerce and National Institute of Standards and Technology. Since AES may require hardware assistance, WPA2 may not run on all current hardware. But it will simultaneously support the current WPA subset, and will ease the migration to WPA2. This plan stands in contrast to the initial WPA standard which does not guarantee WEP support, at least not for simultaneous usage, although some vendors will support both encryption standards through proprietary means.

      On the enterprise side WPA also adds authentication support through RADIUS servers and Extensible Authentication Protocol (EAP). Doubtless administrators will be thankful for a standard capability to interoperate with their existing infrastructure. Smaller networks without RADIUS servers can manually share an ASCII “Pre-Shared Key” (PSK) instead of the infuriating hex nonsense that WEP users have grown used to.

      At the same time, its important to note that many, if not all, older products have other security-related features and that there are precautions users can implement now to mitigate the problems in WEP. Sadly, many users never implement all the security available in their devices. If you have a wireless network and you care, look into these:

      • If your access point allows you to disable SSID broadcast, disable it. SSID is the name of the wireless LAN that shows up when you browse. Youll have to know the SSID and enter it manually when you connect, but strangers wont know it. Actually Ive read that there are tools that can sniff out wireless LANs with unbroadcast SSIDs, but I havent seen them in action. In any event, not broadcasting SSIDs drastically lowers the profile of your LAN, reducing the probability of an attack.
      • Another good idea is to change your WEP password periodically. This is more a roadblock than a real barrier to attackers, but theres no sense in making things easy for them.
      • For heavens sake, change the default administrator password on your access point and refresh it periodically. If someone penetrates your network you dont want them to lock you out of it.
      • Place your access point at the physical center of the building. This will maximize the broadcast quality inside, but has the added security benefit of minimizing it outside. Many access points, such as many Linksys products, have the ability for the administrator to lower the broadcast signal in their advanced settings. You can use this feature to tune the signal so that it covers your building and as little else as possible.
      • Finally, and most importantly, use MAC address filtering on your network to prevent use by any network adapters other than your own. This, especially in combination with the other measures above, will make it difficult for an outsider to make their way onto your network.

      Of course, even the most elegant network encryption system has a proven weakness: its users. Unless you want to get into 007 stuff like biometrics, in order for your network to be completely secure, you have to trust your users not to betray their own secrets. Sadly, theres little that the Wi-Fi Alliance can do about that.

      Security Supersite Editor Larry Seltzer has worked in and written about the computer industry since 1983. He is co-author of Linksys Networks: The Official Guide from Osborne.

      Larry Seltzer
      Larry Seltzer
      Larry Seltzer has been writing software for and English about computers ever since—,much to his own amazement— He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.For several years, he wrote corporate software for Mathematica Policy Research (they're still in business!) and Chase Econometrics (not so lucky) before being forcibly thrown into the consulting market. He bummed around the Philadelphia consulting and contract-programming scenes for a year or two before taking a job at NSTL (National Software Testing Labs) developing product tests and managing contract testing for the computer industry, governments and publication.In 1991 Larry moved to Massachusetts to become Technical Director of PC Week Labs (now eWeek Labs). He moved within Ziff Davis to New York in 1994 to run testing at Windows Sources. In 1995, he became Technical Director for Internet product testing at PC Magazine and stayed there till 1998.Since then, he has been writing for numerous other publications, including Fortune Small Business, Windows 2000 Magazine (now Windows and .NET Magazine), ZDNet and Sam Whitmore's Media Survey.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.