Wi-Fi Protected Setup now supports NFC for tap-to-connect access to work, home networks

Wi-Fi Protected Setup now supports NFC for tap-to-connect access to work, home networks

Summary: Connecting to a wireless network just got that little bit easier, thanks to NFC support. No, that doesn't include you, iPhone users.

TOPICS: Networking, Wi-Fi

And they said NFC was limited in what it could do, like mobile payments or exchanging contact information. How wrong they were.

The Wi-Fi Alliance announced Wednesday that users can now "tap-to-connect" to wireless networks using their smartphone or tablet via Wi-Fi Protected Setup — a way of accessing a network with the push of a button on the wireless router.

It's the little things in life, you know?

The non-profit industry association network said the capability extends to NFC as many devices do not have user interfaces, and a solution needed to be found. A range of devices, like cameras, gaming devices, smart home appliances, and thermostats will be able to connect to networks with a single tap.

That's now three methods that Wi-Fi Protected Setup supports — the push-button on the router, the PIN setup, and now NFC, which remains popular with Android and BlackBerry users as a way of making mobile payments.

Through the new NFC-enabled method, the router's configuration is wirelessly handed to the device and will be connected via WPA2 security, either through a traditional wireless network or an ad-hoc direct network.

Wi-Fi Alliance president and chief executive Edgar Figueroa said the organization will continue to evolve its certified programs to support requirements today and in the future.

More than 10,000 wireless devices have been certified for Wi-Fi Protected Setup since 2007. A number of devices, including those from Broadcom, Marvell, Mediatek, and Qualcomm, are already enabled with the NFC capability.

Topics: Networking, Wi-Fi

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.


Log in or register to join the discussion
  • Is WPS still insecure?

    Reaver can still crack into *any* network in less than 10h that has WPS active without rate limiting, because of how the authentication number is verified.

    You get the first 4 verified separately from the last 4, and the last digit is a checksum. So you send the same last 4 all the time and tries all combinations of the first 4 until you get "OK", then you do the reverse and then send the correct first 4 and go through the 3 numbers + the 1 checksum digit until you're accepted into the network. So in a maximum of 11000 tries you can get in, and 5500 on average.
  • Old News

    I installed an 'NFC enabled' 'Linksys Router' when I purchased my 'NFC enabled NL1020' 'Windows Phone' over 6 months ago.
  • Security risk?

    I don't know how secure this is. But I am almost sure someone will crack it now that its expanding in uses.
  • WPS is fundamentally insecure and worthless

    WPS is an extra hassle for most use cases over WPA-PSK. It's also extremely insecure and the Wi-Fi Alliance forces companies to have it on by default. Sometimes it's even impossible to shut it down.