Opportunistic Wireless Encryption Definition & Meaning

Opportunistic wireless encryption uses a secret key to encrypt Internet sessions hosted on open Wi-Fi networks. Public Wi-Fi networks with no required password or authentication process are convenient, especially for users who are on the go or need to quickly access their bank account or work email. But they’re also extremely susceptible to hacking, particularly man-in-the-middle attacks, where a third-party attacker intercepts the four-way handshake process and pretends to be the main parties. Opportunistic wireless encryption (OWE) removes much of attackers’ opportunity to intercept the handshake process and gain access to a user’s Internet activity.

Instead of using a public pre-shared key (PSK), in which the handshake process can easily be hacked, OWE uses a Diffie-Hellman encryption key exchange, creating a unique key for the two parties. After the key exchange is successful, the networks perform a four-way handshake before finalizing and enabling an encrypted connection.

OWE weaknesses

Unfortunately, although OWE makes it more difficult for malicious parties to perform man-in-the-middle attacks, it’s still susceptible to compromise. OWE doesn’t authenticate either user or network, unlike many encryption protocols. This means that an attacker can masquerade as a network by falsifying the wireless access point (WAP) and renaming it with the name of a nearby Wi-Fi network. Users believe they are using a legitimate network and log into that network, potentially using passwords or other sensitive information. Their online actions can then be intercepted by the attacker. This kind of hack is known as an evil twin attack.

Top Articles

The Complete List of Text Abbreviations & Acronyms

From A3 to ZZZ we list 1,559 text message and online chat abbreviations to help you translate and understand today's texting lingo. Includes Top...

How to Create a Website Shortcut on Your Desktop

This Webopedia guide will show you how to create a desktop shortcut to a website using Firefox, Chrome or Internet Explorer (IE). Creating a desktop...

Windows Operating System History & Versions

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

Hotmail [Outlook] Email Accounts

By Vangie Beal Hotmail was one of the first public webmail services that could be accessed from any web browser. Since 2011, Hotmail, in terms...

No-Code Development Definition &...

No-code development is a method of application development that allows people without programming...

Trusted Device Definition &...

A trusted device is a machine, such as a mobile phone, laptop, tablet...

What Is a Columnar...

A columnar database management system (CDBMS) is a type of database management system...