Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • IT Management
    • PC Hardware

    IBM Proposes WiFi Security Approach After Firesheep

    Written by

    Brian Prince
    Published October 29, 2010
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      IBM is proposing a new approach to address WiFi security in the wake of the Firesheep plug-in for Firefox.

      The Firesheep extension can be used to hijack the sessions of people using unencrypted sites such as Facebook and Twitter on an open wireless network. The tool was released less than a week ago at the ToorCon 12 conference in San Diego, Calif., and has since been downloaded more than 440,000 times.

      In response, IBM’s X-Force team has gone public with what it calls “Secure Open Wireless.” In a joint blog post, Tom Cross, manager of IBM Internet Security System X-Force Advanced Research Team, and X-Force researcher Takehiro Takahashi, explained the company has been working on a secure way to “set up an open access point that has encryption and authentication of the network provider.”

      “If you think about how HTTPS works, you’re establishing an encrypted connection to a Website, but you don’t have to have a password set up with that Website in order to establish that encrypted connection,” they blogged. “The security of an HTTPS session comes from the fact that the Website you are connecting to presents a digital certificate, signed by a trusted third-party certificate authority, demonstrating that the Website you are connecting to legitimately controls the domain name you are trying to reach.”

      In IBM’s proposal, “the wireless networks would establish encrypted connections with their clients by presenting a digital certificate demonstrating that the operator of the access point is the legitimate user of the SSID associated with that access point,” the researchers blogged.

      Cross told eWEEK that X-Force has created a working demo using Linux machines and a consumer-grade access point with minor changes to a few open-source software packages.

      “We have an approach that could allow home users and small businesses to use unsigned certificates with a security model similar to the one employed by SSH, where the first time you connect to an access point your client caches the certificate that was used in association with the access point’s SSID, and then the next time you connect to that SSID your computer will warn you if the certificate has changed,” he said. “This model has worked well with SSH and it is certainly preferable to not having any encryption at all.”

      In the blog post, Cross and Takahashi used the example of an open wireless network with the service set identifier (SSID) “ibm.com.” When a user connects, “our access point would send down a digital certificate for ‘ibm.com,’ and your wireless client would establish an encrypted connection with us, knowing that because the name in the certificate is the same as the SSID, the network you are connecting to must be run by IBM,” according to the blog.

      “The result would be that when you open up your wireless client you could establish secure, encrypted connections to networks operated by people (or companies) that you trust, knowing that those networks are really operated by the people (or companies) that they claim they are operated by without needing to have a password,” the pair blogged.

      This approach goes beyond SSL VPN (secure sockets layer virtual private network) used by companies to enable remote intranet access because those VPNs do not protect access to the entire Internet, Cross told eWEEK.

      Right now, Secure Open Wireless remains in the early stages – IBM has a patent pending, as well as a paper with a technical discussion on the subject that is a few months away from being published. In the blog post, the researchers urged certificate authorities, wireless access point manufacturers and others to get in touch with X-Force on the issue.

      “Our proposal is actually very easy to implement…The real challenge is raising awareness about this approach and getting industry to adopt it,” Cross said.

      Brian Prince
      Brian Prince

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×