What´s the WPS Protocol

1729 Words4 Pages

The WPS protocol relies on an eight digit Personal Identification Number (PIN) to allow the authentication of users on to the network. The protocol further relies on a session of eight Extensible Authentication Protocol (EAP) messages that are followed by a final message which identifies the successful completion of the session. WPS automatically configures the network name (SSID) and the WPA security key for the access point and the WPS enabled client. The benefit is that a user does not need to know what the SSID or the passcode or security key is.

Routers with WPS enabled will have an eight digit pin code typically printed on their case, with portable mobile Wi-Fi devices such as 3G or 4G Wi-Fi routers, this is often the last eight digits of the IMEI number . Devices such as printers or some game consoles will have their own 8 digit pin code which they present to be entered into the Wi-Fi admin console.

The technical architecture of the WPS is defined by three device types which can access the network. These are:

 A Registrar – the device which has the authority to either issue or revoke credential on the network. (Wi-Fi Alliance 2006) While the registrar may be separate from the Access Point (for example the router) it is typically found within the router.
 The Enrollee – the device that is looking to join the network wirelessly.
 The Access Point (AP): The device which can function as the proxy between the enrollee and the registrar.

There are four methods overall which allow for network access via Wi-Fi Protected Setup (WPS):

Push Button Configuration (PBC): With this method, there is either a virtual/software based or physical button which a user is able to connect multiple devices via engaging the butto...

... middle of paper ...

... WPS attack is underway. An example of this is a product known as Kismet-SVN which detects and alerts when an excessive number of WPS queries are being made. An screen shot of kismet is presented in Appendix A, Image 3.

5) Purchase/Use a router that does not have WPS or that can be successfully patched.
As the saying goes, “Prevention is the best cure.” While many Enterprise level routers do not have WPS included these can be costly and difficult users with limited technical ability to set-up. Therefore the recommendations for those who wish to ensure maximum security to either purchase a SOHO router without WPS. For those whom already have a router in place they should check via the openly available list which is regularly updated titled “WPS Flaw Vulnerable Devices” (Jagermo, 2012) to ensure that the router they have can be patched to mitigate vulnerabilities.

More about What´s the WPS Protocol

Open Document