Wireless Security: WPA Vs WAPI, should we be worried?

Chris Rose

2004

Abstract

The IEEE 802.11 standard includes an optional encryption capability, the Wired Equivalent Privacy (WEP) however, WEP is vulnerable to attack and can easily be broken, therefore WEP was recently temporarily supplemented with Wi-Fi Protected Access (WPA) which offers improvements over WEP while a newer, more secure protocol 802.11i is developed. However, China has now introduced a new security protocol called WLAN Authentication and Privacy Infrastructure (WAPI) which is not a part of the IEEE 802.11 standard and is not interoperable with 802.11 which means that there will be two incompatible wireless security standards which will be inconvenient and more expensive for users. More importantly, because China is a large developing market, WAPI is an attempt by China to exert itself internationally as a major player in technological innovation by creating their own standard, even though this has the possibility to cause immense economic harm to established networking companies and disruption in the worldwide technological infrastructure.

References

  1. Arar, Y.: Beefing up 802.11b Security PCWorld (2002, February 4)
  2. Borisov, N. Goldberg, I., Wagner, D.: Intercepting Mobile Communications: The Insecurity of 802.11. Proceedings of the 7th International Conference on Mobile Computing and Networking, Rome, Italy (July, 2001)
  3. Economides, N., Flyer, F.: Compatibility and Market Structure for Network Goods. New York University. (November, 1997)
  4. Katz, M., Shapiro, C.: Network Externalities, Competition and Compatibility. American Economic Review (June 1985)
  5. Krechmer, K.: The Fundamental Nature of Standards: Economics Perspective Communications Standards Review (2000)
  6. Lemon, S., Lawson, S.: Clouds hang low over Chinese WLAN standard IDG News Service. (December 19, 2003). Retrieved from the World Wide Web on 1/14/04 from http://wireless.itworld.com/4276/031219chinawlan/page_1.html
  7. Mathias, C.: Chinese food for thought. EETimes. (January 5, 2004) Retrieved from the World Wide Web on 1/14/04 from http://www.eetimes.com/comm/c/rd/OEG20040105S0043
  8. Oraskari, J.: Bluetooth versus WLAN IEEE 802.11x. Department of Computer Science and Engineering, Helsinki University of Technology (2001)
  9. Schwartz, E.: Researchers crack new wireless security spec. InfoWorld (February 14, 2002)
  10. TIA: China Promotes New Wireless Encryption Standard. Pulse Online. (December 2003) Retrieved from the World Wide Web on 1/14/04 from http://pulse.tiaonline.org/article.cfm?ID=1911
  11. Varian, H.: The Information Economy: How much will two bits be worth in the digital marketplace? Scientific American (September 1995)
  12. Weatherspoon, S.: Overview of IEEE 802.11b Security. Intel Technology Journal (2000, Q2)
Download


Paper Citation


in Harvard Style

Rose C. (2004). Wireless Security: WPA Vs WAPI, should we be worried? . In Proceedings of the 3rd International Workshop on Wireless Information Systems - Volume 1: WIS, (ICEIS 2004) ISBN 972-8865-02-3, pages 18-23. DOI: 10.5220/0002682800180023


in Bibtex Style

@conference{wis04,
author={Chris Rose},
title={Wireless Security: WPA Vs WAPI, should we be worried?},
booktitle={Proceedings of the 3rd International Workshop on Wireless Information Systems - Volume 1: WIS, (ICEIS 2004)},
year={2004},
pages={18-23},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002682800180023},
isbn={972-8865-02-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 3rd International Workshop on Wireless Information Systems - Volume 1: WIS, (ICEIS 2004)
TI - Wireless Security: WPA Vs WAPI, should we be worried?
SN - 972-8865-02-3
AU - Rose C.
PY - 2004
SP - 18
EP - 23
DO - 10.5220/0002682800180023