Security Development

Wi-Fi security protocols used in Wi-Fi Alliance certified products are now open to industry review: 

  1. IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications," IEEE Std 802.11-2016, http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6178212&isnumber=6178210 

  1. IEEE Standard for Information technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Amendment 1: Fast Initial Link Setup", IEEE Std 802.11ai-2016, https://standards.ieee.org/findstds/standard/802.11ai-2016.html  

  1. IEEE Draft Standard for Information technology -- Telecommunications and information exchange between systems Local and metropolitan area networks -- Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, REVmd/D3.0, Oct. 2019 

  1. IEEE 802.1X:  IEEE Std 802.1X™-2010, IEEE Standard for Local and Metropolitan Area Networks: Port-Based Network Access Control, Institute of Electrical and Electronics Engineers, Inc., February 2010. 

  1. IETF RFC 5216: The EAP-TLS Authentication Protocol, https://tools.ietf.org/html/rfc5216  

  1. IETF RFC 6460: Suite B Profile for Transport Layer Security (TLS), https://tools.ietf.org/html/rfc6460  

  1. IETF RFC 7268: AAA Attributed for IEEE 802 Networks, https://tools.ietf.org/html/rfc7268  

  1. IETF RFC 5289: TLS Elliptic Curve Cipher Suites with SHA-256/384 and AES GCM, https://www.ietf.org/rfc/rfc5289.txt  

  1. IETF RFC 5288: AES Galois Counter Mode (GCM) Cipher Suites for TLS, https://tools.ietf.org/html/rfc5288  

  1. IETF RFC 8110: Opportunistic Wireless Encryption, https://tools.ietf.org/html/rfc8110

  1. Opportunistic Wireless Encryption Specification, https://www.wi-fi.org/file/opportunistic-wireless-encryption-specification

  1. Device Provisioning Protocol Specification, https://www.wi-fi.org/file/device-provisioning-protocol-specification

In addition, Wi-Fi Alliance has identified the following potential security protocol updates and will review all comments received: 

  1. To be announced

* = required field

If you provide comments, feedback, suggestions or other ideas to Wi-Fi-Alliance related to the subject matter of this document, unless otherwise agreed to in writing by Wi-Fi Alliance, you agree that such comments, feedback, suggestions and other ideas are not confidential and that Wi-Fi Alliance may freely use such comments, feedback, suggestions or other ideas without providing any additional consideration to you.