It's where someone discovers a wireless network, in the City perhaps, and plugs their laptop into that network for a few hours of priceless wireless surfing. Well it's all just about to come to an end thanks to the WiFi Alliance
The industry body, the WiFi Alliance, has outlined its plans to beef up security across wireless networks in order to prevent the apparently damaging practice of War-Chalking, or indeed simply hacking a wireless network. The new standard it has proposed is the WPA, Wireless Protected Access standard, which will stand in as a replacement to the fairly shoddy WEP, Wired Equivalent Privacy, and as a stepping stone before the implementation of the 802.11i security standard from the Internet Engineering Task Force (IETF).
The new standard is very much working with the IETF standard in mind and is likely to include the facility for inclusion of such standards. Fundamentally however, WPA uses a standard called TKIP, Temporal Key Integrity Protocol, which, interestingly, uses the same algorithm as the old WEP standard - although keys are constructed in a different fashion. This will give each network user their own security key that can be changed periodically, making the whole thing somewhat more secure.
You
Requires Free Membership to View
There's an awful lot riding on the security developments of WiFi. A lot of companies are staking a lot of money on it and, it would seem, that both business and consumers are very interested in this technology. Intel, for instance, has recently invested more than $100 million in WiFi start-ups and plans to start shipping its Collexico wireless chip component, that will have both 802.11a and 802.11b compatibility. Let's just hope this helps plug the gap and enables developments to progress.
Copyright 2002. IT-Director.com provides IT decision makers with free daily e-mails containing news analysis, member-only discussion forums, free research, technology spotlights and free on-line consultancy. To register for a free email subscription, click here.
Network Management Strategies for the CIO

Join the conversationComment
Share
Comments
Results
Contribute to the conversation