Security is still the main issue holding back deployment of all 802.11 products. The ease with which 802.11's encryption...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
technology, WEP (wired equivalent protocol), can be deciphered has caused many potential users to take a "wait-and-see" approach to 802.11 deployment. Current precautions address several reported wireless LAN security flaws, and emerging network designs and protocols promise to go a long way toward addressing user concerns. For now, though, the battle for 802.11 security is still in the feature-comparison stage.
While concerns about 802.11b security might have delayed some enterprises from launching WLAN networks, interest and sales in the technology remain strong.
The current version of 802.11's encryption technology, WEP, is based on static keys that never change, enabling shareware software such as AirSnort to monitor a wireless network and determine the WEP key after listening to as little as 100MB of traffic. As a result, several standards bodies have been formed to plug the security gap, and current efforts include encryption enhancements, virtual private networks, authentication and IEEE 802.11x and 802.11i.
The soon to be ratified IEEE 802.11x specification can be applied to all IEEE access networks, including wired networks. The architecture provides a framework for authentication, encryption, message integrity and key distribution, and is designed to work in conjunction with existing security standards, such as extensible authentication protocol (EAP) and remote access dial-in user service (RADIUS).
The 802.11i specification defines how security is implemented specifically in wireless networks, including 802.11b and 802.11a. It will start with firmware upgrades that use the temporal key integrity protocol (TKIP), expected at the beginning of next year, followed by new silicon with AES (an iterated block cipher) and TKIP backward compatibility toward the end of 2003.
Among other things, TKIP generates new encryption keys for every 10KB of data transmitted.802.11i is supplementary to the MAC layer and applies to 802.11 physical standards a, b and g. AES encryption is more robust than TKIP and replaces WEP and RC4. AES involves hardware optimization, making it impossible to upgrade older 802.11x hardware. Devices using the AES algorithm would still be able to interoperate with the older devices, but only by using weaker security technologies.
Despite security concerns, large corporations have rolled out and are continuing to roll out 802.11-based LANs. Microsoft, for example, has over 10,000 wireless clients connected through 2,000 access points between Redmond and its five international campuses.
There is a lot of misleading information about 802.11 security -- educating potential WLAN users about what's available to secure their networks is as important as anything to encourage them to use it. Shrouding an 802.11 network in the same level of protection as a wired LAN is actually not difficult, according to Jose Granado from Ernst and Young's Security & Technology Solutions practice. For starters, although secure sign-on identification (SSID) and WEP will not deter a determined hacker, they will protect against general abuse and prevent unauthorized users (in neighboring offices for example) from accidental roaming onto the network.
At the next level, many vendors are supplying proprietary security features with 802.11 equipment. Companies such as Cisco Systems and 3Com have implemented 128-bit WEP to enhance security. Cisco's 802.11x EAP solution is paired with a network login system and is relatively unique in that it authenticates users, rather than network interface cards, which can easily be stolen. Authenticating users for specific access points eliminates the need for the network manager to constantly manage the primitive WEP technology. Automatic re-authentication is available through the Aironet dynamic security solution.
Some access points also allow an access list to be configured. This list determines which MAC addresses (i.e., which WLAN network cards) are authorized to communicate with the access point. If the client MAC address is not listed, then the access point will halt all communication with that station. This can be clumsy to administer, but it does provide a higher level of protection.
VPNs have traditionally provided secure solutions for remote users of wired LANs, and are being extended to provide the same protection for WLAN systems. A VPN supplies secure remote access for dial-up, DSL, cable-modem and extranet users by acting as a boundary between the enterprise LAN and the Internet. Through integration with firewall software, VPNs can offer authentication, privacy, access control and traffic-shaping capabilities to restrict bandwidth consumption per user. Layering VPN over WEP on an 802.11 network is a popular solution that offers robust security. On the negative side, VPN solutions are expensive and the network takes a substantial performance hit with the added encryption.
Symbol Technologies' wireless VPN, AirBeam Safe, includes standard authentication, key distribution and encryption mechanisms, such as Kerberos. It also includes fast roaming for mobile and voice applications, EAP/TLS (Transport Layer Security), RADIUS and TKIP, offering cost-effective ways to secure data and prevent unauthorized users from accessing enterprise networks. Symbol's 4131 Access Point can detect the presence and location of unauthorized or "rogue" access points and alert network administrators to take appropriate action.
The introduction of 802.11a running at a maximum of 54Mbps promises to help with network performance considerations. New software products are being developed, including more flexible, policy-based controls.
While concerns about 802.11b security might have delayed some enterprises from launching WLAN networks, interest and sales remain strong. Several solutions are currently available to help secure networks.
Many current solutions are proprietary in nature, clumsy to administer or expensive to implement. There is a lot of misleading information about 802.11 security -- typical of an emerging market.
Several standards bodies have been formed to plug the 802.11 security gap, and initiatives include encryption enhancements, authentication and IEEE 802.11x and 802.11i. New software products are being developed, including more flexible policy-based controls.
Plenty of hope is being pinned on 802.11x and 802.11i to solve WLAN's security shortcomings, and should these prove to be misplaced, the industry will receive a significant setback. It will be some time before 802.11x can be implemented throughout the software stack.
the451 (www.the451.com) is an analyst firm that provides timely, detailed and independent analysis of news in technology, communications and media. To evaluate the service click here.