You are here: Wireless Security Technology > Subtopic 1 > Content
Security is an important concern on any network, but it's especially so for a wireless one. A wireless network is inherently less secure than a wired one because it eliminates many of the physical barriers to network access. Information travels back and forth through the air and is open to eavesdropping and intercept ion. As a result issues surrounding security come up in almost any discussion of implementing a WLAN.
Despite the implication of its name, WEP doesn't really provide privacy equivalent to that of a wired network. There are different levels of WEP available, depending on the type of hardware you are using. The strength of WEP is measured by the length of the key used to encrypt the data. The longer the key, the harder it is to crack (in terms of the time and computing power required). The encryption key used by WEP, regardless of its length, is static and never changes unless it is periodically and manually changed by the administrator on all devices, a nearly impossible task in a large environment. This means that an intruder eavesdropping on wireless transmissions could monitor network traffic over time and gather enough information to decipher the key and decrypt the data. The heavier the network traffic and the more computing power the intruder had at his or her disposal, the less time it takes.
The second major weakness of WEP is that it does nothing to authenticate users on the network, which is why MAC address filtering was developed. However, MAC address is a property of a network device, not a user or even a computer. If an intruder stole a wireless NIC whose MAC address was in the allow list of an access by an access point they would be granted network access. Plus MAC addresses can be spoofed.
VPN is a secure network within the Internet. It uses Internet as its WAN infrastructure. The main advantage of VPN is that it saves provides a secure path to access a network remotely. It uses tunnels to hide the underlying information on the network being used. When the client establishes a connection with the server the client authenticates with the server using normal authentication mechanisms such as a password. The client and server negotiate tunnel encapsulation, and encryption mechanisms to create a security association. The client signs, encrypts and encapsulates, and transmits the data whereas the server de-encapsulates, decrypts and authenticates the client and data.
WLAN security is very important, especially for applications hosting valuable information, e.g. transmitting credit card numbers. Without basic security procedures in place they make your information vulnerable to outsiders, some of which who purposefully do not wish you well. A WLAN should therefore provide a range of different data encryption and station authorization access options so that each user can be given the appropriate level of security for their particular applications.
WEP aims to provide security by encrypting data over radio waves so that it is protected as it is transmitted from one end point to another. Every WEP packet is encrypted separately with an RC4 cipher stream generated by an encryption key. That key is made up of a 24-bit initialization vector (IV) and either a 40-bit or 104-bit WEP key that's usually set by your wireless device. Combined, they have a total length of 64 or 128-bits, hence the popular names of 64 and 128-bit WEP keys (some vendors used to call the 64-bit key a 40-bit key, but they simply weren't including the 24-bit IV -- so 64 and 40-bit WEP are the same thing). This transmitted packet is generated by a mathematical operation called 'bitwise exclusive OR' (XOR) using the packet sent to your network interface card (NIC) by your computer and the RC4 encryption key. The same XOR operation is used to secure data in your RAID storage system or might be used to encrypt a virus.
The first problem with WEP is that every packet you send also includes the IV in plaintext; any would-be snooper can immediately see part of the key. The second problem with WEP is that the IV is only 24-bits long, you can only get 16,777,216 different RC4 encryption streams for every key, regardless of how long the rest of the key is. The plaintext IV is constantly reused and it takes many packets to send even a quick "Hi, how are you?" instant message. In a high use environment, e.g. a college campus, these streams can be used up within an hour. So it doesn't take long for an intruder to gather up enough packets to start cracking your messages.
One can make the most of WEP by frequently updating the encryption key. This is not an easy task as WEP does not provide network key management. With almost all WLAN NICs and access points (AP), you have to manually reset WEP to the new IV on each and every device. That may only be annoying to do for a home or small office WLAN, but it is difficult and time consuming for network administrators with dozens or even hundreds of wireless-enabled devices. Not to mention that if you enter the IV wrong on a PC, its user will find that it can't get on the network. If you get it wrong on an AP, the entire area of the network that the AP serves will be out of action.
In a low utilization environment, such as a home or small business network, WEP does a good job of keeping casual intruders out. Small offices and home environments with security concerns should update their WEP at least once a week, while companies with ten or more wireless PCs with sensitive information should change the WEP daily.
Originally, MAC addresses had the benefit of being both unique (no two network devices have the same MAC address) and permanent (they're "burned" into the hardware, and cannot be changed). At that time a MAC address was an attribute of the NIC, not the computer it's in; and the only time MAC address could be tied to a computing device was when it had a built-in WLAN adapter, as many laptops do these days. Today this has changed. Today the MAC address can be changed, in some cases via software. For example, WLAN cards can be loaded with firmware that does not use the built-in MAC address, but uses a randomly chosen (ad hoc mode), or is deliberately assigned a spoofed address. And most cable/DSL routers support "MAC address cloning" a simple way to change the MAC address.
In a low utilization environment, such as a home, MAC filtering is a simple system of defense for any home user. It must always be used along with something else as soon as you handle anything such as credit card information. MAC addressing, as it has been implied, does not encrypt the packets in any form. Anybody can see all the information you are sending; it does not matter if they can connect or not to the AP. |
There are three protocols you need to know about -- PPTP, L2TP, and IPSec.
|