In wi-fi safety, passwords are solely half the battle. Selecting the best degree of encryption is simply as very important, and the proper selection determines whether or not your wi-fi LAN is a home of straw or a resilient fortress.
Wi-fi safety protocols have advanced over time to handle points, improve compatibility and strengthen safety in comparison with their predecessors. Wired Equivalency Protocol (WEP) is the unique wi-fi commonplace developed by the IEEE in 1997 to supply a safety commonplace for wi-fi networks. Being new for its time, WEP had a number of safety vulnerabilities that have been later addressed in 2004, when Wi-Fi Alliance launched Wi-Fi Protected Entry (WPA) as its successor. WPA constructed upon WEP by addressing its safety flaws.
WPA was extra of a short lived commonplace used to handle the latter’s points, because it quickly grew to become out of date in 2004 in favor of WPA2, a sooner and safer protocol. WPA2 was a long-term commonplace that remained essentially the most dominant safety protocol till 2018, when Wi-Fi Alliance launched WPA3. Though WPA3 is the most recent wi-fi safety commonplace, most organizations proceed to make use of WPA2.
Why wi-fi encryption issues for enterprises
Encryption is the method of changing knowledge into ciphertext that requires the right keys for decryption, making it troublesome to decode. Encryption occurs at many layers. Enterprise functions and internet commerce are all encrypted, whether or not utilizing an encrypted Wi-Fi connection or a VPN, so wi-fi community encryption is arguably much less vital than it as soon as was.
Wi-Fi encryption, along with the application-specific encryption in use, gives a complete safety baseline for all shopper units. This prevents unencrypted functions from posing a safety threat. Encryption additionally helps make the WLAN surroundings safer from a topology perspective, as a protection towards different potential vulnerabilities.
How unsecured wi-fi networks create dangers
Wi-fi networks require safety protocols to make sure they continue to be safe, environment friendly and are appropriate between numerous units. Wi-fi networks with out these requirements may probably face a number of safety dangers, reminiscent of the next:
- Compromised knowledge. An unsecured community is susceptible to being compromised by inside or exterior risk actors in search of to steal knowledge, eavesdrop or carry out different malicious actions. Anybody inside vary can intercept the radio waves carrying Wi-Fi visitors with out the necessity to entry bodily {hardware} straight.
- Expanded assault floor. Menace actors can use unsecured wi-fi networks as a degree of vulnerability to realize entry to the broader enterprise community. Encryption does not essentially repair this drawback, however attackers who see a WLAN with outdated encryption protocols in place may try to use different weak spots within the wi-fi community.
- Malware distribution. Hackers who achieve entry to the community can distribute viruses, ransomware or different malware throughout units linked to it. This could result in knowledge breaches that create and result in monetary loss for the group.
How every wi-fi safety protocol works
Most wi-fi APs include the flexibility to allow one in all 4 wi-fi encryption requirements:
- Wired Equal Privateness (WEP).
- Wi-Fi Protected Entry (WPA).
- WPA2.
- WPA3.
WEP is the primary era of wi-fi safety protocols, adopted by WPA. Nevertheless, organizations ought to keep away from these older WLAN safety requirements, as they’ve been deprecated. Not solely are WEP and WPA simply crackable by commoditized functions, however in addition they point out that the shopper units restricted to them are outdated and will jeopardize WLAN efficiency.

How WPA2 works
Because the successor to WPA, WPA2 was ratified by the IEEE in 2004 as 802.11i. WPA2’s power comes from utilizing Superior Encryption Customary and Counter Mode with Cipher Block Chaining Message Authentication Code Protocol, an authentication mechanism.
- AES. Developed by the U.S. authorities to guard categorized knowledge, AES includes three symmetric block ciphers. Every cipher encrypts and decrypts knowledge in blocks of 128 bits utilizing 128-, 192- and 256-bit keys, counting on the elevated processing energy of recent Wi-Fi {hardware} and shopper units.
- CCMP. Protects knowledge confidentiality by permitting solely licensed community customers to obtain knowledge. It makes use of cipher block chaining message authentication code to make sure message integrity.
KRACK vulnerability exposes WPA2 flaws
WPA2 was a big step ahead in Wi-Fi safety, however two main flaws ultimately emerged:
- The important thing alternate utilized in WPA2 has inherent weaknesses that make it a poor match for delicate knowledge.
- WPA2-Private, which makes use of preshared keys, is simply as robust because the PSK password used to safe it.
KRACK vulnerability
WPA2 has a significant downside often known as the key reinstallation assault (KRACK) vulnerability, which exploits the reinstallation of wi-fi encryption keys. WPA2-Enterprise has a stronger authentication scheme than WPA2-Private because of its use of Extensible Authentication Protocol. Nevertheless, the KRACK vulnerability exists on the encryption stage. Because of this, it impacts all WPA2 implementations.
Trade analysts extensively acknowledged KRACK as a critical WPA2 safety flaw. The discovering prompted know-how suppliers to shortly roll out software program patches to mitigate threat till the arrival of the following era of wi-fi safety. However many specialists argued the KRACK vulnerability would show troublesome to use in the actual world.
Weak PSKs compromise the four-way handshake
A brand new Wi-Fi community connection begins with a cryptographic four-way handshake between an endpoint and AP.
- Each units show they know a preestablished authentication code — Pairwise Grasp Key (PMK) in enterprise mode and PSK in private mode — with out both one revealing it explicitly by a sequence of back-and-forth messages.
- The shopper gadget sends a cryptographic response to the AP to substantiate that each units generated the identical encryption key.
- The AP passes a visitors encryption key to the shopper.
- If the endpoint does not acknowledge it has obtained the important thing, the AP assumes a connectivity situation, resending and reinstalling it repeatedly.
KRACK attackers — who should be inside bodily vary of each the shopper and the community — can set off, seize, analyze, manipulate and replay these retransmissions till they’re in a position to decide the important thing, break encryption and achieve entry to community knowledge.
The four-way handshake methodology additionally makes WPA2 networks with weak passcodes weak to offline dictionary assaults, a kind of brute-force assault that entails systematically making an attempt lots of, hundreds or tens of millions of pre-compiled potential passwords, out of earshot of the goal community.
An attacker may seize a WPA2 handshake, take that info offline and use a pc program to check it towards an inventory of doubtless codes. This course of continues till they discover a code that aligns logically with the obtainable handshake knowledge. Dictionary assaults are much less prone to succeed towards lengthy and complicated passwords with combos of uppercase and lowercase letters, numbers and particular characters.
How WPA3 works
In 2018, Wi-Fi Alliance started certification for WPA3, the newest and most safe wi-fi safety commonplace. As of July 2020, Wi-Fi Alliance required all units in search of Wi-Fi certification to help WPA3. New options and necessities embrace the next:
- Protected Administration Frames. Required in WPA3 and optionally available in prior requirements. PMFs assist guard towards eavesdropping and forging. It additionally standardizes the 128-bit cryptographic suite and disallows out of date safety protocols. WPA3-Enterprise has optionally available 192-bit safety encryption and a 48-bit IV for heightened safety of delicate company, monetary and governmental knowledge.
- Stronger CCMP. WPA3-Private makes use of CCMP-128 and AES-128, whereas the enterprise model with 802.1X affords stronger safety choices.
- Safer cryptographic handshake. Replaces the legacy PSK four-way handshake with simultaneous authentication of equals. SAE eliminates the reuse of encryption keys, requiring a brand new code with each interplay. With out open-ended communication between AP and shopper or the reuse of encryption keys, cybercriminals cannot simply eavesdrop or insert themselves into an alternate.
- Wi-Fi Simple Join. Launched by Wi-Fi Alliance alongside WPA3. Wi-Fi Simple Join simplifies the onboarding course of for IoT units with out visible configuration interfaces utilizing a mechanism reminiscent of a QR code scan.
- Wi-Fi Enhanced Open. Safeguards connecting to public Wi-Fi networks by robotically encrypting info between every shopper and AP utilizing a brand new distinctive key.
- Opportunistic Wi-fi Encryption. Supplies an automated key alternate for units that help it. OWE additionally affords eavesdropping-resistant encryption with no person intervention.
WPA3 isn’t impervious to threats, nonetheless. WPA3 has design and implementation flaws often known as Dragonblood vulnerabilities. These embrace two downgrade assaults, by which an attacker forces a tool to revert to WPA2, and two side-channel assaults, which allow offline dictionary assaults. Nevertheless, in accordance with Wi-Fi Alliance, distributors may readily mitigate them with software program upgrades.
WPA3: Essentially the most safe Wi-Fi protocol
Consultants agree WPA3 is finest for Wi-Fi safety, because it’s essentially the most up-to-date wi-fi encryption protocol. Some wi-fi APs don’t help WPA3, nonetheless. In that case, the following best choice is WPA2, which is extensively deployed within the enterprise area at present.
As a result of WEP or WPA are outdated and insecure, community directors ought to change any wi-fi AP or router that helps WEP or WPA with a more recent gadget appropriate with WPA2 or WPA3.
Greatest practices for Wi-Fi deployment and migration
There isn’t any single finest strategy to wi-fi safety. Profitable implementation begins with defining particular necessities tailor-made to the state of affairs and shopper gadget capabilities. Not all environments require essentially the most complete safety, the required infrastructure and the prices that include it.
Sure conditions, reminiscent of these involving PCI or HIPAA, for instance, require stronger safety than others. Wi-Fi safety additionally must be designed for compliance the place regulatory steerage is remitted. In different conditions, organizations should weigh the choice to make use of 802.1X-based safety or PSK-based encryption. This choice comes all the way down to the benefit of use and the complexity of implementation.
Organizations can safe even an open wi-fi community by solely permitting shoppers to entry the web or a focused in-house vacation spot with safe functions.
Defining necessities is commonly some of the difficult points of wi-fi safety. Implementation problem will rely upon complexity of the necessities. Organizations may discover they want a number of sorts of safety in a single surroundings for various use circumstances. The selection would require ongoing periodic auditing or penetration testing, in addition to monitoring for brand spanking new vulnerabilities of present protocols that change into out of date.
Jessica Scarpati is a Boston-based freelance author. She is the previous options and e-zine editor for Informa TechTarget’s SearchNetworking Media Group.
Alissa Irei is senior website editor of Informa TechTarget’s SearchSecurity.
Lee Badman is a community architect specializing in wi-fi and cloud applied sciences for a big personal college. He is additionally an writer and frequent presenter at business occasions.









