The IEEE 802.11i standard will plug all known security holes in IEEE 802.11 wireless LANs, also known as Wi-Fi, but probably won’t see final approval or shipping products until about a year from now, according to an Intel network architect involved in the drafting of the standard who spoke here Thursday at Spring Intel Developer Forum.SAN JOSE — The IEEE 802.11i standard will plug all known security holes in IEEE 802.11 wireless LANs, also known as Wi-Fi, but probably won’t see final approval or shipping products until about a year from now, according to an Intel network architect involved in the drafting of the standard who spoke here Thursday at the Intel Developer Forum.However, technical advances already available can make WLANs far more secure than they originally were. Also, to give themselves some protection, many companies could start by simply using what came with 802.11 to start with, said a Cisco engineer who spoke at the same session.WEP (Wired Equivalent Privacy), the security mechanism initially built into all standard 802.11 products, encrypts data on the wireless network but is flawed because it reuses the same encryption key, said Jesse Walker, a network architect at Intel and the editor of the 802.11i standard now in development under the IEEE. A would-be hacker could figure out that key from a small amount of traffic, he said. WEP also doesn’t stop interlopers from altering data as it crosses the network, he added. Effective WLAN security requires several parts, the engineers said. There have to be mechanisms to make sure the data is really coming from its supposed source, that it can’t be seen and that it can’t be modified.“It’s not enough just to have authentication. You need to have, along with that strong authentication, a strong encryption mechanism, coupled with data integrity,” said Sri Sundaralingam, a technical marketing engineer at Cisco. Among other improvements, 802.11i will include a system for creating fresh keys at the start of each session. It also will provide a way of checking packets to make sure they are part of a current session and not repeated by hackers to fool network users, Walker said. To manage keys, it will use RADIUS (Remote Access Dial-In User Service) to authenticate users and the IEEE 802.1x standard.In advance of the approval of 802.11i, users should be able to give their WLANs a subset of the upcoming security features through a software or firmware upgrade to WPA (Wireless Protected Access), a specification adopted by the Wi-Fi Alliance, the industry group that certifies Wi-Fi products. Beginning in August, all Wi-Fi products will be equipped with WPA, Walker said.WLANs in many companies don’t even have basic protection against “war driving,” in which interlopers drive by buildings or park outside and intercept WLAN traffic, Sundaralingam said. In some companies, managers claim the company has no WLANs but employees have set up their own “rogue” access points, he said.To defend themselves against “war driving,” users can simply turn on the WEP encryption that is already built in, and most war drivers will just move on to one of the many WLANs that isn’t protected, Sundaralingam said. Going to the next step, users can implement user authentication and dynamic WEP, with keys that change, to protect themselves from “script kiddies,” teenagers who use packaged hacking tools to infiltrate systems. Those authentication systems could include EAP-TLS (Extensible Authentication Protocol-Transport Level Security), PEAP (Protected EAP) or Cisco’s LEAP (Lightweight EAP), which Cisco introduced as part of an effort to boost its own products’ security beyond WEP for demanding enterprise customers.For protection against professional hackers, Sundaralingam recommended going the next step to strong encryption systems such as TKIP (Temporal Key Integrity Protocol), which will be used in WPA and 802.11i, or CKIP (Cisco Key Integrity Protocol), a proprietary implementation of the 802.11i recommendations that Cisco developed as a stop-gap measure.As stronger industry-standard security mechanisms become available, Cisco will offer them but also continue to support its own protocols for some time to serve customers that want to use them, Sundaralingam said. “As a company, we’re really happy to see (WPA) gain wide momentum, and very soon it’s going to be supported by multiple vendors,” he said. Related content news Nvidia races to fulfill AI demand with its first Vietnam semiconductor hub Vietnam has been a growing tech manufacturing destination for the past few years, and Nvidia said it is open to a new manufacturing partner in Vietnam. By Sam Reynolds Dec 11, 2023 3 mins CPUs and Processors Technology Industry how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe