You are on page 1of 10
121821, 5.09 PM \WPAS: Bringing Robust Security fr WI-FI Networks ~ Cisco Blogs cisco Cisco Blogs / Networking / WPA3: Bringing Robust Security for Wi-Fi Networks June 3, 2021 4 Comments WPA3: Bringing Robust Security for Wi-Fi Networks Abhishek Dhammawat Wi-Fi Alliance now requires all new Wi-Fi CERTIFIED devices to support WPA3 security. In 2021 the industry will see greater adoption of WPA3 across more devices, networks, and environments — including sensitive environments like governments and financial institutions, The number of devices connected to the internet, including machines, sensors, and smart home devices is forecast to reach 41.6 billion in the next four years. With the increase in number of devices and Wi-Fi adoption, there is an implicit need for better security. It is a common practice today to use the personal devices like mobile phones, tablets etc interchangeably between home and office. The security requirements and the associated constraints for enterprise and personal networks are different. Users enter password for accessing home network deployments while in enterprise, they use stronger security methods requiring username and password, or certificates. Such constraints and change in usage have led to an evolution of wireless security standards. WPAS Evolution W--Fi Protected Access (WPA) has evolved over the course of many years. Wi-Fi Alliance started working upon WPA to circumvent the vulnerabilities surfaced in the WPA2 security. continuing to use our website, you acknow dge the us lents for Wi-Fi Protected okies. Privacy Statement | Change Settings tion and encryption omings of WPA2. hitps:blogs.cisco.comMnotworkinglwpat-bringing-robust-securiyfor-wifinetworks 10 121821, 5.09 PM (WAS: Bringing Robust Security fr WI-FI Networks ~ Cisco Blogs Wi-Fi Security Standards Timeline 802.11 Ratification Wi-Fi Protected ‘Access Il (WPA2) Wired Equivalent [Pe (WEP) Wi-Fi Protected Wi-Fi Protected ‘Access (WPA) ‘Access III (WPA3) WPA3 Technology Legacy Wi-Fi security methods does have multiple security options to configure and thus can lead for operator to choose non optimal security configurations, Permutations and combinations of Wireless Security vO » Additionally, WPAS jo use our website, you acknowledge the use of Frame) negotiation okies. Privacy Statement | Change Settings ication and disassociation ontinu hitps:blogs.cisco.comMnotworkinglwpat-bringing-robust-securiyfor-wifinetworks 210 121821, 509 PM WAS: Bringing Robust Security for WiFi Networks - Cisco Blogs Personal Networks- + For personal networks WPA3 utilizes Simultaneous Authentication Of Equals (SAE) as described in IEEE 802.11 standard. + SAE provides following key advantages when compared to WPA2 PSK (pre- shared key): — + Creates shared secret which is different for each SAE authentication. + Protection against brute force “dictionary” attacks and passive attacks. + Provides forward secrecy + In 2019 the Dragonblood paper revealed that certain theoretical vulnerabilities in SAE were feasible to exploit in practice, enabling an active attacker to recover the password using side channel attacks. In response to the Dragonblood paper, IEEE 802.11 updated SAE by defining a new “Hash-to- Element” (H2E) method, as an optional alternative to the existing “Hunting- and-Pecking” method for the secret PWE (Password Element) derivation used in SAE authentication. H2E is significantly more computationally efficient and provides robust resistance to side channel attack. Enterprise networks — + WPA3-Enterprise 192-bit mode is well suited for deployments in sensitive enterprise environments to further protect Wi-Fi networks with higher security requirements such as government, defense, and industrial. This level of security provides consistent cryptography and eliminates the “mixing and matching of security protocols” that are defined in the 802.11 standard. + For WPA3-Enterprise only mode recently Wi-Fi alliance has also added restrictions to avoid usage of authentication key management IEEE 802.1X EE 802.1X with SHA- By continuing to use our website, you acknowledge the f cookies. Privacy Statement | Change Settings hitps:blogs.cisco.comMnotworkinglwpat-bringing-robust-securiyfor-wifinetworks a0 121821, 5.09 PM \WAS: Bringing Robust Security for WI-FI Networks ~ Cisco Blogs WPAS Transition Modes - + Ease of network upgrade - WPA2 devices has been there for many years in Wi-Fi networks and therefore it was important to have mode of deployment where both WPA2 and WPA3 devices can co-exist. This certainly helps in Wi- Fi networks to migrate gradually from WPA2 towards WPA3 based networks. Wi-Fi alliance has introduced the WPA3 Transition modes for both personal and enterprise networks. With transition mode enabled on SSID both WPA2 and WPA3 supporting devices can connect simultaneously thus paving path for gradual migration of device echo-system from WPA2 to WPA3 Transition Disable - With above ease of network upgrade using transition mode comes the security challenge of WPA3 STAs (stations) undergoing downgrade attacks. The attackers can force WPA3 STAs downgrade to use the WPA2 and legacy security vulnerable technologies. To circumvent this problem Wi-Fi alliance has introduced “Transition Disable” indication using which AP and network operator can update WPA3 STAs that the network is fully upgraded to support the most secured algorithm defined in a transition mode. Transition Disable indication is used (in 4-way handshake during association) to disable transition modes for that network on a STA, and therefore provide protection against downgrade attacks. STAs on receiving this indication shall disable use of WEP, TKIP and will disallow association without negotiation of PMF. Enhanced Open - In public places like restaurants and shopping malls Wi-Fi networks are often “Open” —sometimes directly, sometimes based on a simple web signup page. In “Open” networks eavesdropper has visibility to unencrypted Wi-Fi traffic. It will be better if we do have Wi-Fi traffic encrypted though from user perspective the interface or ease of use remains same. For such deployments Wi-Fi alliance has introduced Enhanced Open which uses Opportunistic Wireless Encryption (OWE) for encrypting the traffic based on Diffie Hellman was marketed under rate Enhanced Open By continuing to use our website, you acknowledge the f cookies. Privacy Statement | Change Settings hitps:blogs.cisco.comMnotworkinglwpat-bringing-robust-securiyfor-wifinetworks ano 121821, 5.09 PM \WAS: Bringing Robust Security for WI-FI Networks ~ Cisco Blogs WPA3 Adoption WPA3 has become mandatory for Wi-Fi 6E deployments. Users will see worldwide rollout of Wi-Fi 6E devices as multiple vendors embrace 6 GHz, Up to seven super wide 160 MHz channels can be used with this newly available spectrum, triggering development and innovation for higher bandwidth applications including unified communications, AR/VR, and even holographic video. New use cases will emerge to support telemedicine, virtual learning, and telepresence that rely on Wi-Fi 6E’s speed and latency benefits. All these deployments shall be utilizing the WPA security enhancements Customers have already started migrating their networks to WPA3 security and approximately 60% of Cisco Catalyst and Aironet Access Points Wi-Fi deployments have WPA3 security being used which is a good adoption rate. Cisco helping customers with WPA3 deployments Cisco provides complete solution for WPA3 with Cisco Wireless Stack including Cisco Catalyst Access Points , Catalyst Wireless LAN Controllers, Cisco DNA Centre and Cisco Aironet Active Sensors supporting comprehensive set of WPA3 features. This is also supported on previous generation of Access points and controllers namely Cisco Aironet Access Points and Controllers + Cisco Catalyst and Aironet Access Points, wireless LAN controllers supports WPAS for Personal, Enterprise networks and supports Enhanced Open (OWE). Customers are already happily migrating to WPA3 security using cisco offering. + Cisco Aironet Active Sensors also supports WPA3 and will be playing critical role in WPA3 deployments as operators can run on demand and scheduled tests with sensors connecting as WPAS clients, performing different WPA3. use-cases and isolating upfront any network connectivity issues pertaining to WPAS. These tests are helpful during Cisco Wireless controller and Access Point software upgrades and periodically performing tests in customer network environment + Cisco DNA center provides network automation, management and assurance functionality for WPA3 features thus enabling operators for End-to-End network management. By continuing to use our website, you acknowledge the use of es. Privacy Statement | Change Settings hitps:blogs.cisco.comMnotworkinglwpat-bringing-robust-securiyfor-wifinetworks 510 121821, 5.09 PM \WAS: Bringing Robust Security for WI-FI Networks ~ Cisco Blogs WPA has brought in significant security enhancements and is critical for networks to upgrade using WPAS security. Wi-Fi 6E and Wi-Fi Alliance mandating WPAS tor all new Wi-Fi certified devices will be critical drivers for the adoption of WPA3. Cisco Catalyst Access Points and Catalyst Wireless LAN Controllers already supports WPA3, please stay tuned for ongoing additions of new WPA3 enhancements via a software upgrade so that our existing and new customers continue to take advantage of new WPAS capabilities. Check out our Cisco Networking video channel Subscribe to the Cisco Networking blog Share By continuing to use our website, you acknowledge the use of cookies. Privacy Statement | Change Settings hitps:blogs.cisco.comMnotworkinglwpat-bringing-robust-securiyfor-wifinetworks 610 121821, 5.09 PM (WAS: Bringing Robust Security fr WI-FI Networks ~ Cisco Blogs Share hitps:blogs.cisco.comMnotworkinglwpat-bringing-robust-securiyfor-wifinetworks m0 121821, 5.09 PM (WAS: Bringing Robust Security fr WI-FI Networks ~ Cisco Blogs Wireless LAN Controllers Wi-Fi WiFi 6 WPA3. 4 Comments hitps:blogs.cisco.comMnotworkinglwpat-bringing-robust-securiyfor-wifinetworks ano 121821, 509 PM WAS: Bringing Robust Security for WiFi Networks - Cisco Blogs Abhishek, very nicely written! . & Abhishek Dhammawat says: June 3, 2021 at 10:08 am Thanks Siva! + El anonymous says June 17, 2021 at 12:47 am Very good + E@ anonymous says June 23, 2021 at 9:52 pm Thanks! Comments are closed. CONNECT WITH CISCO By continuing to use our website, you acknowledge the use of cookies. Privacy Statement | Change Settings hitps:blogs.cisco.comMnotworkinglwpat-bringing-robust-securiyfor-wifinetworks eno 1214/21, 509 PM \WAS: Bringing Robust Security for WI-FI Networks ~ Cisco Blogs Conditions By continuing to use our website, you acknowledge the use of cookies. Privacy Statement | Change Settings hitpsiblogs.]'sco.cominetworkingiypas-bringing-robust-securyfor-wifinetworks s010

You might also like