Security Development

Wi-Fi security protocols used in Wi-Fi Alliance certified products are now open to industry review: 

  1. IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications," IEEE Std 802.11-2016, http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6178212&isnumber=6178210 

  1. IEEE Standard for Information technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Amendment 1: Fast Initial Link Setup", IEEE Std 802.11ai-2016, https://standards.ieee.org/findstds/standard/802.11ai-2016.html  

  1. IEEE Draft Standard for Information technology -- Telecommunications and information exchange between systems Local and metropolitan area networks -- Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, REVmd/D3.0, Oct. 2019, https://www.techstreet.com/ieee/standards/ieee-p802-11?product_id=2009234

  1. IEEE 802.1X:  IEEE Std 802.1X™-2010, IEEE Standard for Local and Metropolitan Area Networks: Port-Based Network Access Control, Institute of Electrical and Electronics Engineers, Inc., February 2010. 

  1. IETF RFC 5216: The EAP-TLS Authentication Protocol, https://tools.ietf.org/html/rfc5216  

  1. IETF RFC 6460: Suite B Profile for Transport Layer Security (TLS), https://tools.ietf.org/html/rfc6460  

  1. IETF RFC 7268: AAA Attributed for IEEE 802 Networks, https://tools.ietf.org/html/rfc7268  

  1. IETF RFC 5289: TLS Elliptic Curve Cipher Suites with SHA-256/384 and AES GCM, https://www.ietf.org/rfc/rfc5289.txt  

  1. IETF RFC 5288: AES Galois Counter Mode (GCM) Cipher Suites for TLS, https://tools.ietf.org/html/rfc5288  

  1. IETF RFC 8110: Opportunistic Wireless Encryption, https://tools.ietf.org/html/rfc8110

  1. Opportunistic Wireless Encryption Specification, https://www.wi-fi.org/file/opportunistic-wireless-encryption-specification

  1. Hash-to-element password generation, Client Privacy Mechanisms, Operation Channel Validation, and Beacon protection in IEEE Draft Standard for Information technology -- Telecommunications and information exchange between systems Local and metropolitan area networks -- Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, REVmd/D3.0, Oct. 2019, https://www.techstreet.com/ieee/standards/ieee-p802-11?product_id=2009234
  2. Hash-to-element password generation in IEEE P802.11 Wireless LANs, Changes to Hash-to-Curve, IEEE 802.11-19/1817r2, https://mentor.ieee.org/802.11/dcn/19/11-19-1817-02-000m-hash-to-curve-c...

* = required field

If you provide comments, feedback, suggestions or other ideas to Wi-Fi-Alliance related to this document, unless otherwise agreed to in writing by Wi-Fi Alliance, you agree that such comments, feedback, suggestions and other ideas are not confidential and that Wi-Fi Alliance may freely use such comments, feedback, suggestions or other ideas without providing any additional consideration to you.