Wireless in the EnterpriseThis newsletter is sponsored by SonicWALLNetwork World's Wireless in the Enterprise Newsletter, 08/27/07Are all-wireless networks vulnerable to jamming?By Joanie WexlerThere is much buzz about enterprise access networks going “all wireless” as the increased throughput and range of next-generation 802.11n wireless LANs become available in IEEE-standard products. One consideration of exclusively using the unlicensed airwaves for corporate LAN access is the impact of jamming on network availability. Jamming represents a form of wireless denial-of-service attack, in that a single device transmitting at a higher power than those nearby will block connectivity to the lower-power devices. Putting all your transmission eggs in a Wi-Fi basket could mean that malicious jamming could bring your access network to its knees. Fortunately, to date, we haven’t heard much in the way of intentional, ill-intended jamming attacks on a given company or hot spot. But once enterprises go all wireless, I wonder if this will be serious security concern?
Unintentional interference is common in cell-based Wi-Fi network systems. It radiates from Bluetooth devices, microwave ovens, cordless phones, Wi-Fi access points in a neighboring office and other competitors for unlicensed spectrum. You can use spectrum analyzers, such as those offered by Cognio and its many resellers and OEMs, to detect and pinpoint such sources of interference. Then, basically, you take Ankle Express to go out and physically disable them. But what if criminals enter the jamming game? Jamming devices exist today, primarily for legitimate testing purposes. If the jammer were within the FCC Part 15 regulatory power limits – 1 Watt plus 6 dBi of antenna gain, or about 4 Watts – a legitimate device could easily “out shout” most Wi-Fi devices, which typically radiate about 100 milliwatts of power, according to wireless aficionado Craig Mathias, principal at Farpoint Group in Ashland, Mass. “There are a number of jammers on the market that [can] completely bring 802.11 down,” Mathias says. “You need some kind of radio that can localize where the source of radiation is coming from. If the jammer is illegitimate [transmitting at levels above FCC limits], it could be far away and difficult to remediate.”
|
Contact the author: Joanie Wexler is an independent networking technology writer/editor in California's Silicon Valley who has spent most of her career analyzing trends and news in the computer networking industry. She welcomes your comments on the articles published in this newsletter, as well as your ideas for future article topics. Reach her at joanie@jwexler.com. This newsletter is sponsored by SonicWALLARCHIVEArchive of the Wireless in the Enterprise Newsletter. BONUS FEATUREIT PRODUCT RESEARCH AT YOUR FINGERTIPS Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details. PRINT SUBSCRIPTIONS AVAILABLE International subscribers, click here. SUBSCRIPTION SERVICESTo subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here. This message was sent to: networking.world@gmail.com. Please use this address when modifying your subscription. Advertising information: Write to Associate Publisher Online Susan Cardoza Network World, Inc., 118 Turnpike Road, Southborough, MA 01772 Copyright Network World, Inc., 2007 |
No comments:
Post a Comment