Security Concerns Mount For Wireless Networks - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Infrastructure

Security Concerns Mount For Wireless Networks

Security is top-of-mind for businesses managing wireless networks, especially as they start adding new applications, such as voice over IP. Meru Networks' new offering scrambles malicious code at the radio-frequency signal level.

Meru Networks plans to offer in March an intrusion detection and prevention system that secures wireless local-area networks by scanning for intrusions at the radio-frequency signal layer.

Meru's Security Services Module scrambles the signals and jams the transmission of malicious code coming via rogue access points or other means, says the company. The system scans for threats without disruption while networks are transmitting data and voice packets.

The module is software-based and doesn’t require any hardware additions. Intrusion detection and prevention systems for wireless networks from other vendors often require an overlay of specialized sensors that scan radio-frequency signals for attacks. Meru’s module, priced at $2,500, is designed to be affordable for small and medium-sized businesses.

Security is a top concern for businesses and organizations deploying or managing wireless networks, especially as they start adding new applications, such as voice over IP. Radio frequency level security can prevent intruders from listening in on voice packets that travel over wireless networks or injecting bad packets that confuse the phone system and wreak havoc. "Voice, as well as video, will be the new applications,” says Songwu Lu, a professor in the computer sciences department at the University of California, Los Angeles, who has tested Meru's wireless access points and controller in his research and graduate courses. “For them, rogue access point detection and location privacy is the key," he says.

The San Antonio Community Hospital is using Trapeze Network's RingMaster management software to monitor rogue access points on its wireless network. The 400,000-square-foot hospital has installed about 250 Trapeze access points, which use two radios: One for handling user traffic and the other for scanning. "It lets us know if there's any attempts to connect to our network with unauthorized equipment," says Irv Hoff, the hospital's manager of converged networks.

Hoff says past challenges include the access points shutting off every five seconds during security scans. But the newer version of Trapeze's software solves that problem by designating specific radios to do the scans.

The hospital plans to implement voice-over-IP onto its wireless network so that doctors can communicate with other physicians outside the hospital for referrals and consults. It’s evaluating cordless phones from Nortel and wireless network badges, that physicians would wear, speak and listen through, from Vocera Communications. Says Hoff, "We now feel comfortable to deploy voice because we've locked down our wireless security."

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

Slideshows
11 Things IT Professionals Wish They Knew Earlier in Their Careers
Lisa Morgan, Freelance Writer,  4/6/2021
News
Time to Shift Your Job Search Out of Neutral
Jessica Davis, Senior Editor, Enterprise Apps,  3/31/2021
Commentary
Does Identity Hinder Hybrid-Cloud and Multi-Cloud Adoption?
Joao-Pierre S. Ruth, Senior Writer,  4/1/2021
White Papers
Register for InformationWeek Newsletters
The State of Cloud Computing - Fall 2020
The State of Cloud Computing - Fall 2020
Download this report to compare how cloud usage and spending patterns have changed in 2020, and how respondents think they'll evolve over the next two years.
Video
Current Issue
Successful Strategies for Digital Transformation
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
Slideshows
Flash Poll