AOSS

Last updated

AOSS (AirStation One-Touch Secure System) is a system by Buffalo Technology which allows a secure wireless connection to be set up with the push of a button. AirStation residential gateways incorporated a button on the unit to let the user initiate this procedure. AOSS was designed to use the maximum level of security available to both connecting devices, including both Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA).

Contents

Connection Process

  1. Association Phase: Once AOSS has been initiated on both devices via the AOSS button, the access point will change its SSID to "ESSID-AOSS" and the client will attempt to connect to it. Both devices will attempt connection for two minutes. Connection will be made using a secret 64-bit WEP key known to both devices.
  2. Key Generation Phase: With both devices connected, the AP generates and transfers a unique key to the client, where an RC4 tunnel is created. The AP creates four SSIDs and encryption keys for AES, TKIP, WEP128, and WEP64 generated from a random key script. These keys are available in the user interface of the AOSS AP to be used with non-AOSS clients.
  3. Information Exchange Phase: The client notifies the AP of its encryption support.
  4. Key Transfer Phase: All four encryption keys are transmitted to the client regardless of encryption support, allowing the client to change the SSID if needed. The user does not have access to the keys through the client device.
  5. Reboot Stack: The AP applies the SSID and key for the highest level of encryption supported by the client and reboots. The previously used WEP64 and RC4 tunnel are no longer used. The client adapter will automatically reboot or re-initialize and connect to the SSID using the proper encryption key.

If a subsequent AOSS process connects with a lesser wireless encryption standard, the AP will apply the lesser standard and the Reboot Stack phase will be repeated for all connected devices. [1]

Compatible products

The Nintendo Wi-Fi Connection used by the Nintendo DS, Nintendo DS Lite, Nintendo DSi and Nintendo 3DS is AOSS compatible. [2] AOSS is also included in the PlayStation 3 and in system software 2.00 for the PlayStation Portable, [3] and is available for automatic setup with the PSP with firmware 2.80. The PS Vita is also AOSS compatible as of release. AOSS functionality for all Wii models is included in version 3.0U of the Wii System software, released in August 2007 along with PAL version 3.0E. [4] The technology was advertised through 2009. [5]

See also

Related Research Articles

<span class="mw-page-title-main">Wireless LAN</span> Computer network that links devices using wireless communication within a limited area

A wireless LAN (WLAN) is a wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area such as a home, school, computer laboratory, campus, or office building. This gives users the ability to move around within the area and remain connected to the network. Through a gateway, a WLAN can also provide a connection to the wider Internet.

<span class="mw-page-title-main">Wi-Fi</span> Wireless local area network

Wi-Fi is a family of wireless network protocols based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio waves. These are the most widely used computer networks, used globally in home and small office networks to link devices and to provide Internet access with wireless routers and wireless access points in public places such as coffee shops, hotels, libraries, and airports to provide visitors.

<span class="mw-page-title-main">Wireless access point</span> Device that allows wireless devices to connect to a wired network

In computer networking, a wireless access point, or more generally just access point (AP), is a networking hardware device that allows other Wi-Fi devices to connect to a wired network or wireless network. As a standalone device, the AP may have a wired connection to a switch or router, but, in a wireless router, it can also be an integral component of the router itself. An AP is differentiated from a hotspot, which is a physical location where Wi-Fi access is available.

Wired Equivalent Privacy (WEP) was a severely flawed security algorithm for 802.11 wireless networks. Introduced as part of the original IEEE 802.11 standard ratified in 1997, its intention was to provide data confidentiality comparable to that of a traditional wired network. WEP, recognizable by its key of 10 or 26 hexadecimal digits, was at one time widely used, and was often the first security choice presented to users by router configuration tools.

Wi-Fi Protected Access (WPA), Wi-Fi Protected Access 2 (WPA2), and Wi-Fi Protected Access 3 (WPA3) are the three security certification programs developed after 2000 by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, Wired Equivalent Privacy (WEP).

<span class="mw-page-title-main">Service set (802.11 network)</span> Group of all devices on the same wireless network

In IEEE 802.11 wireless local area networking standards, a service set is a group of wireless network devices which share a service set identifier (SSID)—typically the natural language label that users see as a network name. A service set forms a logical network of nodes operating with shared link-layer networking parameters; they form one logical network segment.

IEEE 802.11i-2004, or 802.11i for short, is an amendment to the original IEEE 802.11, implemented as Wi-Fi Protected Access II (WPA2). The draft standard was ratified on 24 June 2004. This standard specifies security mechanisms for wireless networks, replacing the short Authentication and privacy clause of the original standard with a detailed Security clause. In the process, the amendment deprecated broken Wired Equivalent Privacy (WEP), while it was later incorporated into the published IEEE 802.11-2007 standard.

Temporal Key Integrity Protocol is a security protocol used in the IEEE 802.11 wireless networking standard. TKIP was designed by the IEEE 802.11i task group and the Wi-Fi Alliance as an interim solution to replace WEP without requiring the replacement of legacy hardware. This was necessary because the breaking of WEP had left Wi-Fi networks without viable link-layer security, and a solution was required for already deployed hardware. However, TKIP itself is no longer considered secure, and was deprecated in the 2012 revision of the 802.11 standard.

A wireless distribution system (WDS) is a system enabling the wireless interconnection of access points in an IEEE 802.11 network. It allows a wireless network to be expanded using multiple access points without the traditional requirement for a wired backbone to link them. The notable advantage of WDS over other solutions is that it preserves the MAC addresses of client frames across links between access points.

In cryptography, a related-key attack is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different keys whose values are initially unknown, but where some mathematical relationship connecting the keys is known to the attacker. For example, the attacker might know that the last 80 bits of the keys are always the same, even though they don't know, at first, what the bits are.

<span class="mw-page-title-main">Nintendo Wi-Fi Connection</span> Former online multiplayer gaming service

Nintendo Wi-Fi Connection is a defunct online multiplayer gaming service run by Nintendo that formerly provided free online play in compatible Nintendo DS and Wii games. The service included the company's Wii Shop Channel and DSi Shop game download services. It also ran features for the Wii and Nintendo DS systems.

<span class="mw-page-title-main">Wireless security</span> Aspect of wireless networks

Wireless security is the prevention of unauthorized access or damage to computers or data using wireless networks, which include Wi-Fi networks. The term may also refer to the protection of the wireless network itself from adversaries seeking to damage the confidentiality, integrity, or availability of the network. The most common type is Wi-Fi security, which includes Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is an old IEEE 802.11 standard from 1997. It is a notoriously weak security standard: the password it uses can often be cracked in a few minutes with a basic laptop computer and widely available software tools. WEP was superseded in 2003 by WPA, a quick alternative at the time to improve security over WEP. The current standard is WPA2; some hardware cannot support WPA2 without firmware upgrade or replacement. WPA2 uses an encryption device that encrypts the network with a 256-bit key; the longer key length improves security over WEP. Enterprises often enforce security using a certificate-based system to authenticate the connecting device, following the standard 802.11X.

<span class="mw-page-title-main">Nintendo Wi-Fi USB Connector</span> Discontinued wireless game adapter

The Nintendo Wi-Fi USB Connector is a wireless game adapter, developed by Nintendo and Buffalo Technology, which allows the Nintendo DS, Wii and 3DS users without a Wi-Fi connection or compatible Wi-Fi network to establish an Internet connection via a broadband-connected PC. When inserted into the host PC's USB port, the connector functions with the Nintendo DS, Wii, DSi and 3DS, permitting the user to connect to the Internet and play Nintendo games that require a Wi-Fi connection and access various other online services. According to the official Nintendo website, this product was the best-selling Nintendo accessory to date on 15 November 2007, but was discontinued in the same month. On September 9, 2005, Nintendo announced the Nintendo Wi-Fi Network Adapter, an 802.11g wireless router/bridge which serves a similar purpose.

<span class="mw-page-title-main">Aircrack-ng</span> Software suite

Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs. It works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic. Packages are released for Linux and Windows.

<span class="mw-page-title-main">Wi-Fi Protected Setup</span> Network security standard to create a secure wireless home network

Wi-Fi Protected Setup (WPS) originally, Wi-Fi Simple Config, is a network security standard to create a secure wireless home network.

Piggybacking on Internet access is the practice of establishing a wireless Internet connection by using another subscriber's wireless Internet access service without the subscriber's explicit permission or knowledge. It is a legally and ethically controversial practice, with laws that vary by jurisdiction around the world. While completely outlawed or regulated in some places, it is permitted in others.

<span class="mw-page-title-main">Wii system software</span> Operating system for Nintendos Wii home video game console

The Wii system software is a discontinued set of updatable firmware versions and a software frontend on the Wii home video game console. Updates, which could be downloaded over the Internet or read from a game disc, allowed Nintendo to add additional features and software, as well as to patch security vulnerabilities used by users to load homebrew software. When a new update became available, Nintendo sent a message to the Wii Message Board of Internet-connected systems notifying them of the available update.

SoftAP is an abbreviated term for "software enabled access point". Such access points utilize software to enable a computer which hasn't been specifically made to be a router into a wireless access point. It is often used interchangeably with the term "virtual router".

Online console gaming involves connecting a console to a network over the Internet for services. Through this connection, it provides users the ability to play games with other users online, in addition to other online services.

Network cloaking is an attempt to provide network security by hiding the devices behind the network gateway.

References

  1. "AirStation One-Touch Secure System (AOSS): A Description of WLAN Security Challenges and Potential Solutions" (PDF). Buffalo Technology. October 2004.[ permanent dead link ]
  2. "Business Report 2006" (PDF). Buffalo Technology. Archived from the original (PDF) on November 22, 2009.
  3. "Buffalo Expands Its Partnership with Sony Computer Entertainment Inc. to Further the Integration of its AOSS Technology" (Press release). Buffalo Technology. Archived from the original on November 12, 2006.
  4. Harris, Craig (August 8, 2007). "Overlooked Wii 3.0 Update". Blog: Just One Guy. IGN. Archived from the original on April 27, 2009. Retrieved May 26, 2013.
  5. "Our Technology - AOSS". Buffalo Technology web site. Archived from the original on March 21, 2009. Retrieved May 26, 2013.