HOW DOES WI-FI PROTECTED SETUP WORK?

ZENCC > Blog > HOW DOES WI-FI PROTECTED SETUP WORK?
HOW DOES WI-FI PROTECTED SETUP WORK?

How Does Wi-Fi Protected Setup Work?

Wireless networks have evolved over the years. It was a gruesome task to set up security, hand out IP addresses and connect other Wi-Fi devices to the network. Traditionally, users would have to manually create a wireless network name (SSID), and then manually enter the security key on both the access point and client to prevent unwanted access to their wireless network. This whole process requires the users to have the background knowledge of the WiFi devices and the ability to make the necessary configuration changes.

Nowadays, it’s easier connecting all kinds of devices (from printers and Wi-Fi Cameras to other access points and routers) is a click, this is possible due to something called “Wi-Fi Protected Setup (WPS)”.

WPS is a standard for the easy and secure establishment of a wireless network. With WPS it can automatically configure a wireless network with a network name (SSID) and strong WPA data encryption and authentication. WPS is designed to support various Wi-Fi certified 802.11 products ranging from access points, wireless adapters, Wi-Fi phones, and other consumer electronics devices.

Many Wi-Fi connectable devices have WPS buttons on them these days. To connect a WPS-enabled device to your network, simply press the WPS button on your router or AP then press the WPS button on the device. They identify each other, and you’re off and running.

 

Basically there are three approaches to network setup within Wi-Fi Protected Setup: push-button, PIN entry, and Near Field Communication (NFC). PIN entry is mandatory in all Wi-Fi Protected Setup devices, while the other two are optional.

  1. Push-button configuration (PBC): In some WPS networks, we can connect multiple devices to the network by pushing a button. The access point/wireless router will have a physical button, and other devices may have a physical. Users should be aware that during the setup period which follows the push of the button, unintended devices could join the network if they are in range.
  2. PIN entry: In all Wi-Fi Protected Setup networks, a unique PIN will be required for each device to join the network.  A fixed PIN label or sticker may be placed on a device, or a dynamic PIN can be generated and shown on the device's display (e.g., a TV screen or monitor).  PIN is used to make sure the intended device is added to the network being set up and will help to avoid accidental or malicious attempts to add unintended devices to the network. In this mode, Wi-Fi Protected Setup network encrypts data and authenticates each device on the network.  The PIN entry method is supported in all devices.
  3. Near Field Communication (NFC): A Near Field Communication interface can be used to transfer network settings to a new device without requiring manual entry of its PIN.  The NFC method provides strong protection against adding an unintended device to the network. This is an optional method for Wi-Fi Protected Setup Access Points and devices.

  WiFi

For securing your networks, get in touch with ZENCC. Write to marketing@zencc.net for further details.