Wireless security - is protected access enough?
Most networkers think Wi-Fi is just a brand name, a label placed on Wireless LAN (WLAN) equipment to show that it conforms to one of the IEEE 802.11 standards. This used to be true, but the Wi-Fi Alliance (www.wi-fi.org), the group that tests 802.11 products for interoperability and awards the Wi-Fi mark to those that pass, is slowly becoming less like the IEEE's public relations wing and more like a standards organization in its own right.
Two years ago, Wi-Fi was almost synonymous with 802.11b, the WLAN standard that has since become ubiquitous in offices, homes, and public hotspots alike. The faster 802.11a and 802.11g have broadened Wi-Fi's definition, while at the same time the Alliance has broadened its tests to go beyond the speeds mandated by the IEEE, as well as ensure smooth handoffs when more than one version of 802.11 is used in the same network. But with the publication of its Wi-Fi Protected Access (WPA) specification, which becomes mandatory in all Wi-Fi hardware this October 2003, the Alliance has come its furthest yet. Its motivation is simple: to fix 802.11's most notorious problem-security.
By Andy Dornan at Network Magazine.
[ Read more ]
- Review: Securing Wireless LANs (10 February 2004)
- Review: Wireless Hacks (12 December 2003)
- Review: Real 802.11 Security: Wi-Fi Protected Access and 802.11i (3 November 2003)
- Review: 802.11 Security (3 October 2003)
- Review: Installing, Troubleshooting, and Repairing Wireless Networks (5 September 2003)
- Review: Building Secure Wireless Networks with 802.11 (28 August 2003)
- Review: How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN (22 August 2003)
- Review: WiFi Security (9 July 2003)
- Review: Wireless Security End to End (4 June 2003)
- Review: The Complete Wireless Internet and Mobile Business Programming Training Course (28 May 2003)
- Review: Deploying License-Free Wireless Wide-Area Networks (14 May 2003)
- Review: Maximum Wireless Security (17 February 2003)
- Review: Wireless Security and Privacy: Best Practices and Design Techniques (17 December 2002)