WLAN Authentication and Privacy Infrastructure information
Chinese National Standard for Wireless LANs
WLAN Authentication and Privacy Infrastructure (WAPI) is a Chinese National Standard for Wireless LANs (GB 15629.11-2003).
Although it was allegedly designed to operate on top of Wi-Fi, compatibility with the security protocol used by the 802.11 wireless networking standard developed by the IEEE is in dispute. Due to the limited access of the standard (only eleven Chinese companies had access), it was the focus of a U.S.–China trade dispute. Following this it was submitted to, and rejected by the ISO. It was resubmitted to ISO in 2010, but was cancelled as a project on 21 November 2011 after being withdrawn by China.[1]
^Minutes of JTC1 Ad Hoc Meeting Thursday PM1, 19 Jan 2012. IEEE Standards Association.
and 21 Related for: WLAN Authentication and Privacy Infrastructure information
WLANAuthenticationandPrivacyInfrastructure (WAPI) is a Chinese National Standard for Wireless LANs (GB 15629.11-2003). Although it was allegedly designed...
A wireless LAN (WLAN) is a wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within...
Extensible Authentication Protocol (EAP) is an authentication framework frequently used in network and internet connections. It is defined in RFC 3748...
Chinese National Committee for ISO and IEC; the SAC approves and organizes the implementation of international cooperation and the exchange of projects on standardization...
encryption and RSA keys with modulus lengths of 2048 bits. HTTP digest authentication protocol as defined in RFC 2617. The management console authenticates IT...
interworking with WLAN, inter-operability between IMS using different IP-connectivity networks, routing group identities, multiple registration and forking, presence...
Institute of Electrical and Electronics Engineers. Wireless LAN based on the IEEE 802.11 standards, also widely known as WLAN or WiFi, is probably the...
standards to protect communications between mobile devices and wireless routers ('WLAN'); and standards for local computer networks. One common weakness...
through authentication. There are a number of threats to mobile devices, including annoyance, stealing money, invading privacy, propagation, and malicious...
also used by Wi-Fi) and LTE-WLAN Aggregation (LWA; convergence with Wi-Fi Radio), but the differing capabilities of cellular and Wi-Fi have limited the...
access other computers and information stores easily from any access point. Access may be with computer security, i.e. authenticationand encryption technologies...
rate and computational capability, security solutions proposed for other networks may not be applicable to WBANs. Confidentiality, authentication, integrity...
(TLS-PSK) HTTP authentication Single sign-on to Intel AMT with Microsoft Windows domain authentication, based on Microsoft Active Directory and Kerberos Digitally...
in information requirements. Additionally, none of the conventional RFID, WLAN or RTLS locating solutions advertising for most precise locating serve the...
data. To prevent this it is usually sufficient to enforce the use of authentication, encryption, or VPN that requires a password for network connectivity...
There is native support for WPA and WPA2 authentication in infrastructure networks with the latest service packs and/or updates applied. Windows XP includes...