WLAN Security

I do not know how you came here because you read it on social media, twitter, facebook, google +, stumble upon or anywhere else. But thank you for coming and I trust you take pleasure in reading this as much as I did.

How about to safeguard WLAN? Today wireless systems and two Way Radios are in least secure as wired. You just use right tools and designs.

Physical security is key to security. If you don’t have physical use of network, you can’t utilize it. If you can’t plug cable you don’t have network. This really is situation in wired word.

The greatest security problem, in almost any type wireless network, is insufficient physical security.

802.11 standards use Authentication as alternative for physical security. Issue is that application uses WEP as file encryption.

WEP – Wired Equivalent Privacy hasn’t deserved its title. It doesn’t take a lot more than 2 minutes, with cracking tools, to interrupt WEP.

First WEP versions used 64-bit shared key. 40 bits are for any shared secret and 24 bits are for IV (initialization vector). IV can be used that receiver could decrypt the frame.

Next improvement of first WEP key was 128-bit shared WEP key. With this WEP version 104 bits are utilized for shared key and 24 for initialization vector.

IEEE suggested in 2004 latest version of WEP – WEP2. It uses exactly the same RC4 formula with 128-bit initialization vector. WEP2 hasn’t enhanced considerably security. It only increases time for cracking.

Next thing in wireless security is WPA – Wi-Fi Protected Access.

What is WPA file encryption? Wi-Fi Alliance released in October 2003 Wi-Fi Protected Access – WPA, generation x in WLAN security. Wi-Fi Protected Access doesn’t need a hardware upgrade in 802.11 equipment.

Only software and firmware upgrade is required also it makes minimal degradation in network performance.

WPA was created being an answer for those WEP weak points. It uses Temporal Key Integrity Protocol (TKIP) with Message Integrity Check (MIC). Additionally, it has mutual pre-shared key (PSK) authentication plan using 802.11X/EAP.

WI-Fi Alliance released WPA2 in September 2004. It’s licensed interoperable version of WPA. WPA2 besides PSK 802.1X/EAP authentication, use advanced file encryption mechanism.

This new mechanism is Counter-Mode/CBC-MAC Protocol (CCMP) known as Advanced File encryption Standard (AEP).

WPA and WPA2 have 2 certification modes.



You’ve 4 different versions of Wi-Fi Licensed products:

1) WPA-Personal2) WPA2-Personal3) WPA-Enterprise4) WPA2-Enterprise

Personal Mode is made for office and home (SOHO) atmosphere. You don’t need authentication server (Radius or IAS).

It uses by hand joined PSK (pre-shared key or pass-phrase). Security degree of your wireless network is dependant on this PSK.

So, use mixture of letters, amounts and non-alphanumerical figures.Personal mode uses techniques of file encryption as Enterprise-per-user, per-session, per-packet file encryption with TKIP (WEP) or AES (WEP2).

Enterprise Mode works in handled mode with authentication servers (Radius or IAS). With this particular mode you are able to meet rigorous needs of enterprise security.

The majority of access points and wireless hubs have option of MAC blocking. With MAC blocking, you are able to restrict use of stations you have joined in MAC blocking list.

The primary key to wireless security would be to put as numerous obstacles while you could. Should you concurrently use WEP, WPA, MAC blocking, and when you utilize IPsec tunnel and SSH your wireless network is safe like it’s wire

In the event you beloved this post as well as you wish to receive details with regards to DP4400 walkie talkie generously pay a visit to the site.


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s