Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • IT Management
    • Mobile
    • Networking

    Wireless Security: A Partial Glossary of Wireless Security Terms

    Written by

    Larry Seltzer
    Published December 2, 2008
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Just about a month ago, in early November, the news came out that the first cracks were appearing in WPA, or Wi-Fi Protected Access, a very popular wireless security standard. The compromise that was accomplished by some researchers was not a real killer, but the affected version of WPA (and the associated encryption process, TKIP, or Temporal Key Integrity Protocol), was always meant as a stopgap standard.

      For some time now there have been better standards implemented in shipping wireless products, and there have been many articles published with good advice on improving your wireless security. For example, this one from eWEEK Labs’ Andrew Garcia discusses the attack itself and how you can protect yourself from it. This one from Dan Croft discusses bigger issues of wireless security architecture and policy.

      After reading the wireless security news, Steven M. Bellovin, professor of Computer Science at Columbia University, decided to tighten up the security on his own home wireless network. Bellovin’s house is not an enterprise, so much of the advice and solutions available for dealing with this problem aren’t really applicable. Bellovin didn’t really know how to proceed, and if a professor of Computer Science at an Ivy League school can’t make immediate sense of it all, how is everyone else supposed to?

      I decided to examine the wireless terms that Bellovin encountered in the various products he has to see what they all meant:

      • WEP (Wired Equivalent Privacy)-The old, original, now discredited wireless security standard. Easily cracked.
      • WEP 40/128-bit key, WEP 128-bit Passphrase-See WEP. The user key for WEP is generally either 40- or 128-bit, and generally has to be supplied as a hexadecimal string.
      • WPA, WPA1-Wi-Fi Protected Access. The initial version of WPA, sometimes called WPA1, is essentially a brand name for TKIP. TKIP was chosen as an interim standard because it could be implemented on WEP hardware with just a firmware upgrade.
      • WPA2-The trade name for an implementation of the 802.11i standard, including AES and CCMP.
      • TKIP-Temporal Key Integrity Protocol. The replacement encryption system for WEP. Several features were added to make keys more secure than they were under WEP.
      • AES-Advanced Encryption Standard. This is now the preferred encryption method, replacing the old TKIP. AES is implemented in WPA2/802.11i.
      • Dynamic WEP (802.1x)-When the WEP key/passphrase is entered by a key management service. WEP as such did not support dynamic keys until the advent of TKIP and CCMP.
      • EAP–Extensible Authentication Protocol. A standard authentication framework. EAP supplies common functions and a negotiation mechanism, but not a specific authentication method. Currently there are about 40 different methods implemented for EAP. See WPA Enterprise.
      • 802.1x, IEEE8021X-The IEEE family of standards for authentication on networks. In this context, the term is hopelessly ambiguous.
      • LEAP, 802.1x EAP (Cisco LEAP)-(Lightweight Extensible Authentication Protocol) A proprietary method of wireless LAN authentication developed by Cisco Systems. Supports dynamic WEP, RADIUS and frequent reauthentication.
      • WPA-PSK, WPA-Preshared Key-Use of a shared key, meaning one manually set and manually managed. Does not scale with a large network either for manageability or security, but needs no external key management system.
      • RADIUS-Remote Authentication Dial In User Service. A very old protocol for centralizing authentication and authorization management. The RADIUS server acts as a remote service for these functions.
      • WPA Enterprise, WPA2 Enterprise-A trade name for a set of EAP types. Products certified as WPA Enterprise or WPA2 Enterprise will interoperate. The included types are:

        • EAP-TLS
        • EAP-TTLS/MSCHAPv2
        • PEAPv0/EAP-MSCHAPv2
        • PEAPv1/EAP-GTC
        • EAP-SIM
      • WPA-Personal, WPA2-Personal-See Pre-Shared Key.
      • WPA2-Mixed-Support for both WPA1 and WPA2 on the same access point.
      • authentication algorithms: OPEN, SHARED and LEAP-OPEN in this context meant no authentication; the network was open to all. SHARED refers to preshared key. for LEAP see LEAP.

      And I’ll add a few more:

      • 802.11i-An IEEE standard specifying security mechanisms for 802.11 networks. 802.11i uses AES and includes improvements in key management, user authentication through 802.1X and data integrity of headers.
      • CCMP-Counter Mode with Cipher Block Chaining Message Authentication Code Protocol. An encryption protocol that uses AES.

      Wireless Security: The Main Point

      There, all clear now? Me neither.

      The real point of Bellovin’s blog, which is clearly underscored by the definitions above, is that wireless products throw a vat of alphabet soup at users and it’s no surprise if they make bad decisions in configuration. It’s so easy to find a completely wide-open wireless network; is this because people just don’t care or because securing them is too hard? Some of both, I suppose.

      The terms WPA Personal and WPA Enterprise are attempts to move beyond this problem, at least at the point of purchase. Home users would just look for WPA Personal-compliant products, and enterprises would look for WPA Enterprise, and be assured of a fairly high level of interoperability. But it’s no guarantee of plug-and-play secure networks.

      There’s no easy way out of this problem. Unfortunately, vendors have a strong incentive to retain support for old standards, as they are widely implemented, and this means that configuration screens will be loaded up with lots of the alphabet soup above. Education is not usually a great solution for a security problem, but that’s all we’re left with in wireless security configuration. Wish us luck.

      Security CenterEditor Larry Seltzer has worked in and written about the computer industry since 1983.

      For insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzer’s blog Cheap Hack.

      Larry Seltzer
      Larry Seltzer
      Larry Seltzer has been writing software for and English about computers ever since—,much to his own amazement— He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.For several years, he wrote corporate software for Mathematica Policy Research (they're still in business!) and Chase Econometrics (not so lucky) before being forcibly thrown into the consulting market. He bummed around the Philadelphia consulting and contract-programming scenes for a year or two before taking a job at NSTL (National Software Testing Labs) developing product tests and managing contract testing for the computer industry, governments and publication.In 1991 Larry moved to Massachusetts to become Technical Director of PC Week Labs (now eWeek Labs). He moved within Ziff Davis to New York in 1994 to run testing at Windows Sources. In 1995, he became Technical Director for Internet product testing at PC Magazine and stayed there till 1998.Since then, he has been writing for numerous other publications, including Fortune Small Business, Windows 2000 Magazine (now Windows and .NET Magazine), ZDNet and Sam Whitmore's Media Survey.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.