Dr. Dobb's is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Channels ▼
RSS

LAN Sharks


LAN Sharks

Does wireless networking set your LAN afloat or offer it as bait? Make sure your WLAN keeps the bad guys out

May 2002

Wireless networking is quickly becoming one of the most exciting and fastest growing areas of high technology. Streaming video is now available on properly equipped cell phones, 3G networks are finally being rolled out, and the International Telecommunications Union predicts that the number of mobile phones in use worldwide will soon surpass 1 billion.

In fact, wireless networks are becoming so pervasive that you may encounter them in places you might not ordinarily expect to find them. One example is at the airport check-in counter, where wireless LAN (WLAN) technology is increasingly used for bag matching and curbside check-in applications. Yet despite the heightened state of alert following September 11, these systems are still sometimes deployed without adequate security controls in place.

According to reports recently issued by independent security consultants, WLAN systems at the American Airlines terminals at Denver International Airport and San Jose International Airport were operating completely in the clear, without any encryption in place at all. In one instance, the security experts witnessed an intrusion taking place while they were conducting their tests. In another case, the IP address of the curbside terminal was prominently pasted on the computer monitor. Access to a bag-matching system could, in theory, allow an attacker to manipulate flight information to show that luggage belonged to a boarded passenger, when in fact it did not.

These cases illustrate that even in places where you might expect to find exacting attention paid to security concerns, wireless technologies can still slip under the radar and create potential hazards. But that doesn't mean WLAN technologies should be abandoned. There are steps you can take to ensure that your WLAN deployment is as secure as possible.

The Rising Popularity of WLAN Systems

A WLAN is just what it seems like—a network without wires. WLANs use high frequency radio waves rather than wires to communicate and transfer data between nodes on the network. The simplest WLAN configuration is a peer-to-peer arrangement, also known as an ad hoc WLAN (see the "Ad Hoc WLAN Configuration" diagram). Ad hoc WLANs let desktop and laptop computers communicate wirelessly, as long as they're equipped with compatible WLAN adapters and are within range of one another.

Although ad hoc WLANs are certainly convenient, infrastructure WLANs are probably more common. In this case, WLAN technology is used to extend an existing wired LAN and provide cable-free connectivity between users and resources on the wired network segment. Two types of devices are used on an infrastructure LAN: an access point (see "In Depth" sidebar) and a PC (or PCI) adapter card. The access point is connected to a wired Ethernet network using an ordinary RJ-45 cable (see the "Infrastructure WLAN Configuration" diagram). Once attached, the access point acts as a wireless hub, passing data back and forth between the wired network and the wireless clients.

WLANs come in several different flavors. The two most common types are 802.11a and 802.11b. Both standards use the Ethernet transport protocol, making them compatible with higher-level protocols like TCP/IP. Where they differ is in the specifics of their transmission characteristics.

The 802.11b standard is the more common of the two. 802.11b transmitters operate at 2.4GHz and can transfer data at rates up to 11MBps using direct sequence spread spectrum modulation, also known as DS-CDMA. 802.11b networks are ideal if you're deploying a WLAN in a large facility with significant range requirements, for instance a warehouse or department store. Security experts studying WLANs have spent most of their time looking at 802.11b deployments, but many of the security concerns covered in this article are also common to other 802.11-based networks.

802.11a networks aren't as common as 802.11b, but with data transfer rates of up to 54MBps, they offer superior performance for bandwidth-hungry applications. 802.11a networks operate at 5GHz, a higher frequency than 802.11b systems. Unfortunately, that means they're constrained to a significantly smaller spatial range. 802.11a transmitters rarely send data farther than 60 feet, a far cry from the 300 feet that is common with 802.11b transmitters.

802.11a networks are ideal if you need high performance (for instance, if you're deploying voice or video applications over your WLAN), or if the 2.4GHz band is already somewhat crowded. Cell phones, microwave ovens, and Bluetooth devices all operate in the 2.4GHz band and can degrade the performance of an 802.11b WLAN, so operating an 802.11a network in the 5GHz band avoids this interference.

WLANs are becoming increasingly popular in venues where users demand the benefits of location independence and freedom of movement, or in places that can benefit from simplifying their IT infrastructure. Some examples include:

  • Applications within the enterprise that require roaming and mobility across a floor, building, campus, or between facilities. This sector has been the largest driver of WLAN growth for the past several years.
  • Vertical software applications that involve large amounts of data collection, such as bar codes and industrial automation solutions.
  • Small businesses that can benefit from the simplicity and ease-of-use that WLANs offer.
  • The residential and home-office markets, which have always been more difficult to wire than businesses.
  • The hottest area of growth for WLAN technology over the next few years will probably be in public areas, including airports, hotels, convention centers, and even coffee shops.

In many ways, WLANs are a dream come true. They reduce calls to the company help desk, increase worker productivity, and can lower the total cost of LAN ownership. But WLANs also introduce a host of security risks that must be addressed and controlled before the technology becomes widespread.


Related Reading


More Insights






Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

Dr. Dobb's encourages readers to engage in spirited, healthy debate, including taking us to task. However, Dr. Dobb's moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing or spam. Dr. Dobb's further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy.