News

New security spec for wireless LAN

An industry trade group last week took the wraps off a new 802.11 wireless network security specification based on the Wi-Fi Protected Access (WPA) standard. Created by the Wi-Fi Alliance, WPA provides enterprises with a built-in mechanism to authenticate the identity of users based on the Extensible Authentication Protocol, which runs on Remote Authentication Dial-In User Service network servers.

WPA replaces the static encryption keys that are part of the existing Wired Equivalent Privacy (WEP) security protocol with dynamic keys through use of the Temporal Key Integrity Protocol (TKIP), which is part of the upcoming Institute for Electrical and Electronics' (IEEE) 802.11i Robust Security Network standard. It also includes a message integrity check-sum called ''Michael'' that will help network administrators determine whether an unauthorized user has tried to intercept and decode TKIP keys.

The Wi-Fi Alliance is a non-profit organization that promotes the 802.11 wireless LAN standard. More than 180 companies belong to the organization, and more than 450 products have been certified by it. The Wi-Fi Alliance said in a statement that it plans to make the new technology optional by February of next year, but mandatory about six months later. Most Wi-Fi products will be made WPA-compliant by upgrading software and firmware, representatives at the alliance said.

The WEP encryption method was designed to provide the ''equivalent'' security available in wireline networks for 802.11-enabled WLANs. As defined by the IEEE, WEP encrypts the body of each 802.11 data frame to thwart packet analyzers. WEP could dissuade the casual snooper, but it had some serious drawbacks, primarily stemming from the fact that the secret key used for encrypting the session could easily be retrieved by sniffing a number of encrypted packets sent over air. The IEEE has been promising to solve the flaws of WEP through more advanced encryption methods.

Worries about WLAN security have slowed the rate of enterprise deployments, said Nick Hunn, manager director at TDK Systems Europe. Wi-Fi signals carry beyond the buildings in which the networks are deployed, reaching nearby buildings, parking lots and other public areas.

''The thing to keep in mind,'' Hunn told e-ADT, ''is that it's not difficult to tap into something once it's outside the four walls of the office. It doesn't matter whether it's wireless, modem or ISDN. You've got to say that security should be at a higher level, peer-to-peer behind a VPN. Wireless is not alone in being vulnerable to hacks.''

This quality of the technology has given rise to a practice called ''warchalking,'' which involves marking a series of symbols on sidewalks and walls to indicate nearby wireless access. Savvy computer users with wireless capabilities who spot these symbols can open their laptops and use nearby networks to connect to the Internet. The procedure was inspired, practitioners claim, by the practice of hobos during the Great Depression, who used chalk marks to indicate which homes were friendly. The ''war'' in the name probably comes from ''war dialing,'' a venerable technique in which a hacker programs his or her system to call hundreds of phone numbers in search of poorly protected computer dial-ups. (That name comes from the movie ''War Games,'' in which a character played by Matthew Broderick uses the technique.)

According to Wi-Fi Alliance chair Dennis Eaton, the new WPA standard is actually intended as an interim fix. The idea is to give the 802.11 Task Group I -- the group within the IEEE that is working to correct the deficiencies of WEP -- some breathing room to complete and finalize the full 802.11i amendment to the existing wireless LAN standard. Final ratification of 802.11i is expected sometime in 2004.

About the Author

John K. Waters is a freelance writer based in Silicon Valley. He can be reached at [email protected].