Further explanation: security issues of Wireless LAN (1)

Source: Internet
Author: User

The interconnectivity and sharing of Wireless LAN have highlighted the security issues of Wireless LAN. Wireless LAN security is also the focus of readers. Next, I would like to emphasize its content.

The reason is that this is related to the inherent design of the wireless LAN. For example, we know that the popular IEEE 802.11b and IEEE 802.11g standards currently use a GHz working frequency that can be shared, the WEP encryption technology is weak and vulnerable to DoS attacks and interference.

Next, let's take a look at common wireless LAN security issues and corresponding preventive measures.

1. Wireless LAN security issues

Common security problems in Wireless LAN are as follows:

(1) GHz

Currently, IEEE 802.11b and IEEE 802.11g standards for wireless LAN use GHz radio waves for network communication, without authorization restrictions. In addition, IEEE 802.11b standard wireless products usually cover 100 ~ It can penetrate the walls between 300 meters. Therefore, anyone can use a computer with a wireless network card installed to listen in wireless coverage. Network Data is easily leaked, especially within the company.

(2) WEP is not strong enough

Although the common IEEE 802.11b and IEEE 802.11g standards use WEP encryption, it is also insecure. Because WEP generally uses a 40-bit (10 digits) key, the connection between the wireless network card and the Wireless AP encrypted by WEP is easily cracked. More serious security risks are the wireless network connection created through Windows XP by default and the WEP encryption disabled by the wireless router.

(3) DoS attacks and interference

In a wired LAN, we can block DoS attacks through the firewall, but attackers can bypass the firewall through the wireless LAN to launch attacks on the company or other networks. In addition, although the wireless LAN uses the Spread Spectrum Technology, malicious attackers can also use the jammers to interfere with signals, and the interference sources are not easily detected.

In addition, the defects of the wireless LAN authentication technology can be used for address spoofing and session interception.

2. Common Security Measures

For various common security problems encountered during the use of wireless LAN, we can take the following common security measures:

(1) wireless LAN security Step 1: Change the name,

The SSID value is used as the identifier of a Wireless AP or a wireless router to distinguish other similar devices. users in a wireless LAN can connect to the network without a key, this makes it easy to intercept data. Therefore, do not use the default SSID value for security consideration, and obtain a name that is not easy to guess. Also in the TP-LINK router mentioned above, you can change it in basic settings on the settings page.

(2) Encrypt Your Wireless Network

In a wireless LAN, WEP encryption can be used to ensure the security of network connections. Currently, this encryption technology generally provides a 64/128-bit key mechanism, and some products even support a 256-bit key mechanism.

To enable the WEP encryption function, you can first open the "Basic settings" page of the wireless router. By default, WEP is disabled. Next, select "enable" at WEP and click "WEP Key Settings". On the key settings page, you can create a 64-bit or 128-bit key. For example, if you want to create a 64-bit key, you can click "CREATE" to create four keys, write down these keys, and click "Apply.

Tip: to ensure the security of the created password, you can also enter a password phrase (consisting of numbers and letters ). When using the WEP key function, make sure that all computers and network devices in the wireless network use the same encryption method and key; otherwise, the access fails.


Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.