Wi-Fi Protected Setup
Wi-Fi Protected Setup (WPS) is a standard for easy and secure establishment of a wireless home network, created by the
Wi-Fi Allianceand officially launched on January 8, 2007.
The goal of the WPS protocol is to simplify the process of configuring security on
wireless networks, and so it was first named 'Wi-Fi Simple Config'. The protocol is meant to allow home users who know little of wireless security and may be intimidated by the available security options to configure Wi-Fi Protected Access, which is supported by all Wi-Fi certified devices.
The standard achieves its goal by putting much emphasis into
usabilityand security, and the concept is implemented through four usage models that enable a user to establish a home network. So, to add a new device to the Network the user can have up to the following four choices:
# PIN Method, in which a PIN (Personal Identification Number) has to be read from either a sticker on the new wireless client device (STA) or a display, if there is one, and entered at the "representant" of the Network, either the wireless access point (AP) or a Registrar of the Network, cf below the Protocol Architecture.
This is the mandatory baseline model, every Wi-Fi Protected Setup certified product must support it.
# PBC Method, in which the user simply has to push a button, either an actual or virtual one, on both the AP (or a Registrar of the Network) and the new wireless client device (STA).
Support of this model is mandatory for APs and optional for STAs.
# NFC Method, in which the user simply has to bring the new STA close to the AP or Registrar of the Network to allow a
Near Field Communicationbetween the devices. NFC Forum compliant RFIDtags can also be used.
Support of this model is optional.
# USB Method, in which the user uses a USB stick to transfer data between the new STA and the AP or Registrar of the Network.
Support of this model is optional.
The last two models are usually referred as
Out-of-bandmethods as there is a transfer of information by another channel than the Wi-Fi channel itself.
Note that only the first three models (PIN/PBC/NFC) are currently covered by the Wi-Fi Protected Setup Certification and there is so far no intention to certify the USB method.
This page addresses the common scenario involving an Infrastructure Network. The support of ad hoc networks (IBSS) are not supported by WPS.
The WPS protocol defines three types of devices in a network:
*Registrar: A device with the authority to issue and revoke credentials to a network. A Registrar may be integrated into an AP, or it may be separate from the AP.
*Enrollee: A device seeking to join a
*Authenticator: An AP functioning as a proxy between a Registrar and an Enrollee.
The WPS standard defines three basic scenarios that involve these components:
# AP with internal registrar capabilities configures an Enrollee STA. In this case, the session will run on the wireless medium as a series of EAP request/response messages, ending with the AP disassociating from the STA and waiting for the STA to reconnect with its new configuration (handed to it by the AP just before).
# Registrar STA configures the AP as an Enrollee. This case is subdivided in two aspects: first the session could occur on both a wired or wireless medium, and second the AP could already be configured by the time the Registrar found it. In the case of a wired connection between the devices, the protocol runs over UPnP, and both devices will have to support UPnP for that purpose. When running over UPnP, a shortened version of the protocol is run (only 2 messages) as no authentication is required other than that of the joined wired medium. In the case of a wireless medium, the session of the protocol is very similar to the internal registrar scenario, just with opposite roles. As to the configuration state of the AP, the registrar is expected to ask the user whether to reconfigure the AP or keep its current settings, and can decide to reconfigure it even if the AP describes itself as configured. Multiple registrars should have the ability to connect to the AP.
# Registrar STA configures Enrollee STA. In this case the AP stands in the middle and acts as an Authenticator, meaning it only proxies the relevant messages from side to side.
It should be noted that UPnP is regarded to only apply to a wired medium, while actually it applies to any interface that an IP connection can be set up on. Meaning that after manually setting up a wireless connection, the UPnP can be used over the wireless medium in the same manner as with the wired.
The WPS protocol itself consists as a series of EAP message exchanges that is triggered by a user action and relies on an exchange of descriptive information that should precede that user's action.
The descriptive information is transferred through a new IE that's added to the Beacon, Probe Response and optionally to the Probe Request and Association Request/Response messages. Other than purely informative TLVs, those IEs will also hold the possible, and the currently deployed, configuration methods of the device.The WPS IE, has a type field with a value of '221', and OUI of 00-50-F2-04.The Data part of the IE is constructed out of TLVs that describe the device and its capabilities.
After the identification of the device's capabilities on both ends, a human trigger is to initiate the actual session of the protocol.The session consists of 8 messages, that are followed in the case of a successful session by a message to indicate the protocol is done. The exact stream of messages may change when configuring different kinds of devices (AP or STA) or using different physical media (wired or wireless).
# [http://www.wi-fi.org/ The Wi-Fi Alliance Official Site]
# [http://www.wi-fi.org/wifi-protected-setup/ Wi-Fi Protected Setup Knowledge Center at the Wi-Fi Alliance]
# [http://www.upnp.org/ The UPnP Forum Main Page]
# [http://www.upnp.org/specs/arch/UPnP-DeviceArchitecture-v1.0.pdf UPnP Device Architecture]
Wikimedia Foundation. 2010.
Look at other dictionaries:
Wi-Fi Protected Setup — (WPS) est un standard de réseau local sans fil simple et sécurisé. Conçu par la Wi Fi Alliance, il a été lancé début 2007. Le but du protocole WPS est de simplifier la phase de configuration de la sécurité des réseaux sans fil. Il permet à des … Wikipédia en Français
Wi-fi protected setup — WPS (Wi Fi Protected Setup) es un estándar promovido por la Wi Fi Alliance para la creación de redes WLAN seguras. En otras palabras, WPS no es un mecanismo de seguridad por sí, se trata de la definición de diversos mecanismos para facilitar la… … Wikipedia Español
Wi-Fi Protected Setup — (WPS) ist ein von der Wi Fi Alliance entwickelter Standard zum einfachen und sicheren Aufbau eines drahtlosen Heimnetzwerks. Das Ziel von WPS ist es, das Hinzufügen von Geräten in ein bestehendes Netzwerk zu vereinfachen. Als Schwerpunkt gilt… … Deutsch Wikipedia
Wi-Fi Protected Setup — (защищённая установка), WPS стандарт (и одноимённый протокол) полуавтоматического создания беспроводной сети Wi Fi, созданный Wi Fi Alliance. Офици … Википедия
Protected mode — This article is about an x86 processor mode. For Internet Explorer Protected Mode, see Mandatory Integrity Control. x86 processor modes Mode First supported Real mode Intel 8086 8080 emulation mode NEC … Wikipedia
Wi-Fi Protected Access — (WPA and WPA2) is a certification program administered by the Wi Fi Alliance to indicate compliance with the security protocol created by the Wi Fi Alliance to secure wireless computer networks. This protocol was created in response to several… … Wikipedia
Wi-Fi protected access — (WPA et WPA2) est un mécanisme pour sécuriser les réseaux sans fil de type Wi Fi. Il a été créé en réponse aux nombreuses et sévères faiblesses que des chercheurs ont trouvées dans le mécanisme précédent, le WEP. WPA respecte la majorité de la… … Wikipédia en Français
Wi-Fi Protected Access — (WPA et WPA2) est un mécanisme pour sécuriser les réseaux sans fil de type Wi Fi. Il a été créé en réponse aux nombreuses et sévères faiblesses que des chercheurs ont trouvées dans le mécanisme précédent, le WEP. WPA respecte la majorité de la… … Wikipédia en Français
Windows Vista networking technologies — This article is part of a series on Windows Vista New features Overview Technical and core system Security and safety Networking technologies I/O technologies Management and administration Removed features … Wikipedia
Полный перебор — У этого термина существуют и другие значения, см. Перебор. Полный перебор (или метод «грубой силы», англ. brute force) метод решения математических задач. Относится к классу методов поиска решения исчерпыванием всевозможных… … Википедия