Wireless Security Improvement Using Physical Layer Properties
Sheng Xiao and Weibo Gong, Ph.D.
Novel Protocol for Wireless Security
Scientists at the
To summarize, the new technology uses a novel technique to ensure that only valid users can communicate using a wireless connection. Unauthorized computers are excluded from all communications. The technology involves minor modifications in the physical layer and will work well along with WPA and WPA2 as an additional secure layer.
Necessity to improve Wireless Security
Wireless security breaches are a major concern for organizations and individuals that transmit sensitive data wirelessly. Current industry-standard systems, WPA and WPA2 rely on advanced algorithms and complex passwords to maintain security. Passwords are vulnerable to advanced computing techniques; users or security administrators are other likely points of failure. In addition, advancements in computing technology and novel reversal algorithms, some of which may not yet be public knowledge, could compromise current wireless security systems.
This invention may be best suited for manufacturers of wireless infrastructure who wish to introduce a new physical layer. Possible customers are clients such as government agencies who may require an unbreachable wireless network. Since this works at a basic level below WPA or WPA2, there need not be any concerns that this technology deviates from industry standards.
- Testability: the actual system security level can be verified by measuring certain environmental parameters.
- Incorporates true randomness from the environment; this invention guards against future enhancements in computing technology and novel reversal algorithms.
- Low cost implementation with provable security: this is the first practical scheme that can be integrated within the wireless LAN. This invention could be prototyped within commercially available wireless LANs.
- Security enhanced over transmissions: this security scheme grows stronger with time. The eavesdropper's uncertainty about the shared secrecy between legitimate users would
increase with transmissions.
Michael Jaremchuk, Senior Licensing Officer
Office of Commercial Ventures and Intellectual Property