skip to main content
opinion
Free access

Enterprise wi-fi: we need devices that are secure by default

Published: 24 April 2019 Publication History

Abstract

Seeking to increase awareness of WPA2 Enterprise network security technology flaws and reduce risk to users.

References

[1]
Bartoli, A. et al. (In)Secure Configuration Practices of WPA2 Enterprise Supplicants. In Proceedings of the 13th International Conference on Availability, Reliability and Security; https://dl.acm.org/citation.cfm?id=3230838
[2]
Bartoli, A., Medvet, E., and Onesti, F. Evil twins and WPA2 Enterprise: A coming security disaster? Comput. Secur. 74 (2018), 1--11.
[3]
Brenza, S., Pawlowski, A., and Pöpper, C. A practical investigation of identity theft vulnerabilities in Eduroam. In Proceedings of the 8<sup>th</sup> ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, NY, 2015, 1--14.
[4]
Cassola, A. et al. A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication. NDSS---Network and Distributed Security Symposium. 2013; https://www.ndss-symposium.org/ndss2013/ndss-2013-programme/practical-targeted-and-stealthy-attack-against-wpa-enterprise-authentication/
[5]
Schneider, F.B. Impediments with policy interventions to foster cybersecurity. Commun. ACM 61, 3 (Mar. 2018), 36--38
[6]
Secure by Default. National Cyber Security Centre {Internet}, (May 2, 2017); https://www.ncsc.gov.uk/articles/secure-default
[7]
Snodgrass, J. BYO-Disaster and Why Corporate Wireless Security Still Sucks. DEFCON 21; https://www.defcon.org/images/defcon-21/dc-21-presentations/djwishbone-PuNk1nPo0p/DEFCON-21-djwishbone-PuNk1nPo0p-BYO-Disaster-Updated.pdf
[8]
Souppaya, M. and Scarfone, K. Guidelines for securing wireless local area networks (WLANs). NIST Spec Pub. belt.es; 2012;800: 153; https://www.nist.gov/publications/guidelines-securing-wireless-local-area-networks-wlans-0
[9]
Weaknesses in MS-CHAPv2 authentication. Microsoft Technet (Aug. 20, 2012); https://blogs.technet.microsoft.com/srd/2012/08/20/weaknesses-in-ms-chapv2-authentication/
[10]
Wi-Fi Alliance introduces security enhancements. In Wi-Fi Alliance (Jan. 8, 2018); https://www.wi-fi.org/news-events/newsroom/wi-fi-alliance-introduces-security-enhancements

Cited By

View all
  • (2020)Understanding Server Authentication in WPA3 EnterpriseApplied Sciences10.3390/app1021787910:21(7879)Online publication date: 6-Nov-2020

Index Terms

  1. Enterprise wi-fi: we need devices that are secure by default

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Communications of the ACM
    Communications of the ACM  Volume 62, Issue 5
    May 2019
    83 pages
    ISSN:0001-0782
    EISSN:1557-7317
    DOI:10.1145/3328504
    Issue’s Table of Contents
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 April 2019
    Published in CACM Volume 62, Issue 5

    Check for updates

    Qualifiers

    • Opinion
    • Popular
    • Un-reviewed

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)409
    • Downloads (Last 6 weeks)106
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2020)Understanding Server Authentication in WPA3 EnterpriseApplied Sciences10.3390/app1021787910:21(7879)Online publication date: 6-Nov-2020

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Digital Edition

    View this article in digital edition.

    Digital Edition

    Magazine Site

    View this article on the magazine site (external)

    Magazine Site

    Login options

    Full Access

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media