ISO rejects China's WAPI wireless security protocol
Even so, the Chinese government plans to continue to support WAPI
IDG News Service - The International Standards Organization (ISO) last week rejected a security protocol that was backed by some Chinese representatives as an amendment to the group's wireless LAN standard.
The ISO turned down the Chinese technology, called the WLAN Authentication and Privacy Infrastructure (WAPI), in voting to adopt the IEEE 802.11i security specification that was developed by the Institute of Electrical and Electronics Engineers Inc., according to a member of the IEEE 802.11 Working Group who asked not to be named because of working group rules.
The ISO, a network of standards institutes that overlooks specifications in a wide variety of fields, routinely adopts IEEE 802.11 standards and incorporates them into its body of specifications, the IEEE working group member said.
The Chinese government said that it would continue to support WAPI and that the rejection by the ISO would not affect use of WAPI in China, according to an online article by China's official Xinhua news service.
Votes at the ISO on adopting amendments to IEEE 802.11 standards normally aren't controversial, the working group member said.
"At least in 802.11, there's never been anyone who's brought in a proposal that wasn't developed in 802.11," he said.
The IEEE approved 802.11i in 2004. China's government at one time proposed forcing foreign companies to license WAPI but later dropped those plans.
A document from the IEEE 802.11 Working Group indicates that resistance to incorporating WAPI into an international wireless LAN standard has grown amid concerns about secrecy, namely the use of an undisclosed algorithm in the protocol.
Last week, 22 Chinese companies announced the formation of a group called the WAPI Industrial Union to promote adoption of WAPI. The group claimed its protocol offers better security than 802.11i.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Neustar 2014 DDoS Attacks and Impact Report For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. The survey reveals evidence that the...
- Acxiom Case Study This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity...
- Windows® XP Migration: Protect and Secure Critical Data With the end of the Microsoft Windows XP operating system's lifecycle on April 8, 2014, businesses are faced with the decision to migrate...
- Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management This CommVault Business Value and Technology White Paper explains how Simpana IntelliSnap® Recovery Manager can make your application recovery fast and reliable.
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts