Android 10은 Wi-Fi Alliance(WFA)의 Wi-Fi Protected Access 버전 3(WPA3) 및 Wi-Fi Enhanced Open 표준을 지원합니다. 자세한 내용은 WFA 사이트의 보안을 참고하세요.
WPA3은 개인 및 기업 네트워크를 위한 새로운 WFA 보안 표준입니다. 현대적인 보안 알고리즘과 강력한 암호화 스위트를 사용하여 전반적인 Wi-Fi 보안을 개선하는 것이 목표입니다. WPA3에는 다음 두 요소가 있습니다.
WPA3-Personal: 사전 공유 키(PSK) 대신 SAE(Simultaneous Authentication of Equals)를 사용하여 오프라인 사전 공격, 키 복구 및 메시지 위조와 같은 공격에 맞서 사용자에게 강력한 보안 보호 기능을 제공합니다.
WPA3-Enterprise: 강력한 인증 및 링크 레이어 암호화 메서드와 민감한 보안 환경을 위한 192비트 보안 모드(선택사항)를 제공합니다.
Wi-Fi Enhanced Open은 Opportunistic Wireless Encryption(OWE)을 기반으로 하는 공용 네트워크의 새로운 WFA 보안 표준입니다. 카페, 호텔, 식당, 도서관 등 비밀번호로 보호되지 않는 개방형 네트워크에서 암호화를 제공하고 개인 정보를 보호합니다. Enhanced Open은 인증을 제공하지 않습니다.
WPA3 및 Wi-Fi Enhanced Open은 전반적인 Wi-Fi 보안을 개선하여 더 나은 개인 정보 보호 기능을 제공하고 알려진 공격을 강력하게 차단합니다. 아직 많은 기기가 이러한 표준을 지원하지 않거나 이러한 기능을 지원하기 위한 소프트웨어 업그레이드를 받지 못했으므로 WFA는 다음과 같은 전환 모드를 제안했습니다.
WPA2/WPA3 전환 모드: 제공하는 액세스 포인트는 WPA2 및 WPA3 표준을 동시에 지원합니다. 이 모드에서 Android 10 기기는 WPA3을 사용하여 연결하고, Android 9 이하를 실행하는 기기는 WPA2를 사용하여 동일한 액세스 포인트에 연결합니다.
WPA2/WPA3-Enterprise 전환 모드: 제공하는 액세스 포인트는 WPA2-Enterprise 및 WPA3-Enterprise 표준을 동시에 지원합니다.
OWE 전환 모드: 제공하는 액세스 포인트는 OWE와 개방형 표준을 동시에 지원합니다. 이 모드에서 Android 10 기기는 OWE를 사용하여 연결하고, Android 9 이하를 실행하는 기기는 암호화 없이 동일한 액세스 포인트에 연결합니다.
Android 12는 기기에 WPA2를 사용하지 않고 WPA3을 대신 사용하도록 지시하는 메커니즘인 전환 중지 표시를 지원합니다.
기기가 이 표시를 수신하면 WPA3을 사용하여 전환 모드를 지원하는 WPA3 네트워크에 연결합니다. Android 12는 WPA3 Hash-to-Element(H2E) 인증 교환도 지원합니다. 자세한 내용은 WPA3 사양을 참고하세요.
이 페이지에 나와 있는 콘텐츠와 코드 샘플에는 콘텐츠 라이선스에서 설명하는 라이선스가 적용됩니다. 자바 및 OpenJDK는 Oracle 및 Oracle 계열사의 상표 또는 등록 상표입니다.
최종 업데이트: 2025-07-27(UTC)
[[["이해하기 쉬움","easyToUnderstand","thumb-up"],["문제가 해결됨","solvedMyProblem","thumb-up"],["기타","otherUp","thumb-up"]],[["필요한 정보가 없음","missingTheInformationINeed","thumb-down"],["너무 복잡함/단계 수가 너무 많음","tooComplicatedTooManySteps","thumb-down"],["오래됨","outOfDate","thumb-down"],["번역 문제","translationIssue","thumb-down"],["샘플/코드 문제","samplesCodeIssue","thumb-down"],["기타","otherDown","thumb-down"]],["최종 업데이트: 2025-07-27(UTC)"],[],[],null,["# WPA3 and Wi-Fi Enhanced Open\n\nAndroid 10 introduces support for the Wi-Fi Alliance's\n(WFA) Wi-Fi Protected Access version 3 (WPA3) and Wi-Fi Enhanced Open\nstandards. For more\ninformation, see\n[*Security* on the WFA site](https://www.wi-fi.org/discover-wi-fi/security).\n\nWPA3 is a new WFA security standard for personal and enterprise\nnetworks. It aims to improve overall Wi-Fi security by using modern security\nalgorithms and stronger cipher suites. WPA3 has two parts:\n\n- **WPA3-Personal:** Uses simultaneous authentication of equals (SAE) instead of pre-shared key (PSK), providing users with stronger security protections against attacks such as offline dictionary attacks, key recovery, and message forging.\n- **WPA3-Enterprise:** Offers stronger authentication and link-layer encryption methods, and an optional 192-bit security mode for sensitive security environments.\n\nWi-Fi Enhanced Open is a new WFA security standard for public\nnetworks based on opportunistic wireless encryption (OWE). It provides\nencryption and privacy on open, non-password-protected networks in areas such as\ncafes, hotels, restaurants, and libraries. Enhanced Open doesn't provide\nauthentication.\n\nWPA3 and Wi-Fi Enhanced Open improve overall Wi-Fi security, providing better\nprivacy and robustness against known attacks. As many devices don't yet support\nthese standards or haven't yet had software upgrades to support these features,\nWFA has proposed the following transition modes:\n\n- **WPA2/WPA3 transition mode:** The serving access point supports WPA2 and WPA3 standards concurrently. In this mode, Android 10 devices use WPA3 to connect, and devices running Android 9 or lower use WPA2 to connect to the same access point.\n- **WPA2/WPA3-Enterprise transition mode:** The serving access point supports WPA2-Enterprise and WPA3-Enterprise standards concurrently.\n- **OWE transition mode:** The serving access point supports both OWE and open standards concurrently. In this mode, Android 10 devices use OWE to connect, and devices running Android 9 or lower connect to the same access point without any encryption.\n\nAndroid 12 supports Transition Disable indication,\na mechanism that instructs a device to not use WPA2 and use WPA3 instead.\nWhen a device receives this indication, it uses WPA3 to connect to a WPA3\nnetwork that supports a transition mode. Android 12\nalso supports WPA3 Hash-to-Element (H2E) authentication exchange. For more\ninformation, see the\n[WPA3 Specification](https://www.wi-fi.org/file/wpa3-specification).\n\nWPA3 and Wi-Fi Enhanced Open are supported only in client mode.\n\nImplementation\n--------------\n\nTo support WPA3 and Wi-Fi Enhanced Open, implement the Supplicant HAL interface.\nStarting with Android 13,\nthe interface uses AIDL for the HAL definition.\nFor releases before Android 13,\ninterfaces and vendor partitions use HIDL.\nThe HIDL interface can be found in\n[`hardware/interfaces/wifi/supplicant/1.3/`](https://android.googlesource.com/platform/hardware/interfaces/+/refs/heads/android16-release/wifi/supplicant/1.3/),\nand the AIDL interface can be found in\n[`hardware/interfaces/wifi/supplicant/aidl/`](https://android.googlesource.com/platform/hardware/interfaces/+/refs/heads/android16-release/wifi/supplicant/aidl/),\n| **Note:** If the HIDL interface is implemented, WPA3 and Wi-Fi Enhanced Open require supplicant HAL 1.2 or higher.\n\nThe following are required to support WPA3 and OWE:\n\n- Linux kernel patches to support SAE and OWE\n\n - cfg80211\n - nl80211\n- [`wpa_supplicant`](https://android.googlesource.com/platform/external/wpa_supplicant_8/+/refs/heads/main)\n with support for SAE, SUITEB192 and OWE\n\n- Wi-Fi driver with support for SAE, SUITEB192, and OWE\n\n- Wi-Fi firmware with support for SAE, SUITEB192, and OWE\n\n- Wi-Fi chip with support for WPA3 and OWE\n\nPublic API methods are available in Android 10 to allow\napps to determine device support for these features:\n\n- [`WifiManager#isWpa3SaeSupported`](https://developer.android.com/reference/kotlin/android/net/wifi/WifiManager#iswpa3saesupported)\n- [`WifiManager#isWpa3SuiteBSupported`](https://developer.android.com/reference/kotlin/android/net/wifi/WifiManager#iswpa3suitebsupported)\n- [`WifiManager#isEnhancedOpenSupported`](https://developer.android.com/reference/kotlin/android/net/wifi/WifiManager#isenhancedopensupported)\n\n[`WifiConfiguration.java`](https://cs.android.com/android/platform/superproject/+/android-latest-release:packages/modules/Wifi/framework/java/android/net/wifi/WifiConfiguration.java)\ncontains new key management types, as well as pairwise ciphers, group ciphers,\ngroup management ciphers, and Suite B ciphers, which are required for OWE,\nWPA3-Personal, and WPA3-Enterprise.\n\nEnable WPA3 and Wi-Fi Enhanced Open\n-----------------------------------\n\nTo enable WPA3-Personal, WPA3-Enterprise, and Wi-Fi Enhanced Open in the Android\nframework:\n\n- **WPA3-Personal:** Include the `CONFIG_SAE` compilation option in the\n `wpa_supplicant` [configuration file](https://android.googlesource.com/platform/external/wpa_supplicant_8/+/refs/heads/android16-release/wpa_supplicant/android.config).\n\n ```\n # WPA3-Personal (SAE)\n CONFIG_SAE=y\n ```\n- **WPA3-Enterprise:** Include the `CONFIG_SUITEB192` and `CONFIG_SUITEB`\n compilation options in the `wpa_supplicant` configuration file.\n\n ```\n # WPA3-Enterprise (SuiteB-192)\n CONFIG_SUITEB=y\n CONFIG_SUITEB192=y\n ```\n- **Wi-Fi Enhanced Open:** Include the `CONFIG_OWE` compilation option in the\n `wpa_supplicant` configuration file.\n\n ```\n # Opportunistic Wireless Encryption (OWE)\n # Experimental implementation of draft-harkins-owe-07.txt\n CONFIG_OWE=y\n ```\n\nIf WPA3-Personal, WPA3-Enterprise, or Wi-Fi Enhanced Open aren't enabled, users\nwon't be able to manually add, scan, or connect to these types of networks.\n\nValidation\n----------\n\nTo test your implementation, run the following tests.\n\n### Unit tests\n\nRun\n[`SupplicantStaIfaceHalTest`](https://cs.android.com/android/platform/superproject/+/android-latest-release:packages/modules/Wifi/service/tests/wifitests/src/com/android/server/wifi/SupplicantStaIfaceHalTest.java)\nto verify the behavior of the capability flags for WPA3 and OWE. \n\n```\natest SupplicantStaIfaceHalTest\n```\n\nRun\n[`WifiManagerTest`](https://cs.android.com/android/platform/superproject/+/android-latest-release:cts/tests/tests/wifi/src/android/net/wifi/cts/WifiManagerTest.java)\nto verify the behavior of the public APIs for this feature. \n\n```\natest WifiManagerTest\n```\n\n### VTS tests\n\nIf the HIDL interface is implemented, run: \n\n atest VtsHalWifiSupplicantV1_3TargetTest\n\nIf the AIDL interface is implemented, run: \n\n atest VtsHalWifiSupplicantStaIfaceTargetTest"]]