Introduction
In 1999 the IEEE completed and approved the standard known as 802.11b, and WLANs were born. Finally, computer networks could achieve connectivity with a useable amount of bandwidth without being networked via a wall socket. Suddenly connecting multiple computers in a house to share an Internet connection or play LAN games no longer required expensive or ugly cabling. Business users could get up out of their chairs and sit in the sunshine while they worked. New generations of handheld devices allowed users access to stored data as they walked down the hall to a meeting. The dawn of networking elegance was upon us. Users could set their laptops down anywhere and instantly be granted access to all networking resources. This was, and is, the vision of wireless networks, and what they are capable of delivering.
Fast forward to today. While wireless networks have seen widespread adoption in the home user markets, widely reported and easily exploited holes in the standard security system have stunted wireless' deployment rate in enterprise environments. While many people don't know exactly what the weaknesses are, most have accepted the prevailing wisdom that wireless networks are inherently insecure and nothing can be done about it. Can wireless networks be deployed securely today? What exactly are the security holes in the current standard, and how do they work? Where is wireless security headed in the future? This article attempts to shed light on these questions and others about wireless networking security in an enterprise environment.
A few technical details
WLAN networks exist in either infrastructure or ad hoc mode. Ad hoc networks have multiple wireless clients talking to each other as peers to share data among themselves without the aid of a central Access Point. An infrastructure WLAN consists of several clients talking to a central device called an Access Point (AP), which is usually connected to a wired network like the Internet or a corporate or home LAN. Because the most common implementation requiring security is infrastructure mode, most security measures center around this design, so securing an infrastructure mode wireless network will be the focus of this article. 802.11b specifies that radios talk on the unlicensed 2.4GHz band on one of 15 specific channels (in the US, we are limited to using only the first 11 of those 15 channels). Wireless network cards automatically search through these channels to find WLANs, so there is no need to configure client stations to specific channels. Once the NIC finds the correct channel, it begins talking to the Access Point. As long as all of the security settings on the client and AP match, communications across the AP can begin and the user can participate as part of the network.