Over the last few years, Wi-Fi has become the primary mode for network access. This is especially true in the consumer market where the rapid adoption of Smart Home technology, streaming media and IoT devices has increased the number of devices in the home. The need for flexible workspace and ubiquitous mobility has driven the adoption of Wi-Fi in the enterprise. The exponential growth of the “bring your own device” (BYOD) and IoT markets has added the requirement for high density, efficiency and security.
Security is a concern for any network but with wireless being the primary method to access the network, security and the continued success of Wi-Fi both become a critical requirement to the network. This requirement is particularly challenging for Wi-Fi, as users take their devices that they use at home and personal environments into the enterprise. These two domains have different constraints and requirements when it comes to security.
Typically, consumer electronics, IoT and home deployments use a simple password for access to the network. In the Enterprise settings, stronger security mechanisms such as username and password or certificates are used.
Wi-Fi Protected Access (WPA) has been a continual security evolution within the Wi-Fi Alliance. WPA2 was created 14 years ago to fill in some of the gaps within the original WPA implementation and continues to secure Wi-Fi communications today. Multiple enhancements have been done to WPA2 over the years such as the addition of Protected Management Frames, Fast BSS Transition and utilization of stronger cryptographic algorithms under the covers. However, a blog that published last October and referred to the “KRACK attack” shined a spotlight on Wi-Fi security that highlighted a need for the industry to move to a new generation of authentication and encryption mechanisms. This is a new generation that could resist modern attack techniques and incredibly powerful attack computers and position Wi-Fi security to keep pace with the ever changing threat landscape. This brought forward a need for enhancements to the existing WPA2 features, creating the next iteration called WPA3….
At last January’s Consumer Electronics Show (CES) in Las Vegas, the Wi-Fi Alliance® announced new security enhancements for Wi-Fi Protected Access. These new enhancements were released under the WPA3 label, with supporting products expected to start appearing throughout 2018. In this blog, we will focus on two major areas of WPA3, all aiming at better protecting Wi-Fi communications:
The goal of WPA3-personal is to maintain the same capabilities and user experience as WPA2. The new enhancement is the added benefit of making it difficult to find the passphrase used for authenticating to the WLAN from just viewing traffic or associations.
Two other areas the Wi-Fi Alliance has focused on from a security perspective are Open Networks and Device Provision/Onboarding.
Per the announcement this past January, WPA3 will be backward compatible with WPA2 meaning your WPA3 devices will be able to run WPA2. However, it is expected that it will take a few years for vendors to fully transition to WPA3 only modes, therefore WPA2 transition capabilities may be in use for the near future.
Published with permission from blogs.cisco.com