
CHAPTER 10 Privacy and Security 
185
Security for Wireless Home Networks
Most home network security threats come from Internet hackers, but to get to your 
network, they must fi nd a way to get past your fi rewall—not an easy task. With the 
rapid acceptance of wireless home networking, a new breed of hackers has emerg-
ed. Wireless hackers tap directly into your wireless network, thus bypassing the 
fi rewall. Wireless LANs are installed on the private side of the fi rewall, so the 
fi rewall offers no protection from wireless hackers. Wireless hackers can tap into 
your home network from the house next door or from a car parked at curbside in 
front of your house. Unless you are constantly checking the status of the LAN, you 
are probably unaware that your network is being violated. Once online, the wireless 
hacker’s PC becomes just another peer node on your LAN.
WEP and WPA Encryption
Virtually all network gear supports a security feature called Wired Equivalent Privacy, 
or simply WEP. WEP uses data encryption techniques to scramble information passed 
between wireless devices. A hacker attempting to tap into your WEP-enabled wire-
less network would fi nd only meaningless bits. The AP and client device on the 
home network shares an encryption key that is used to scramble and unscramble the 
encrypted information sent via wireless links.
Wi-Fi Protected Access, or WPA, is an enhanced encryption technique that is 
available on most modern network gear (after 2004). WPA employs authentication 
via user ID and password and uses more sophisticated encryption. Once the 
authorized client PC is authenticated, the AP sends a temporary encryption key that 
is valid only during the current communications session.
WEP is not as secure as WPA, but having any encryption method in place is a 
major deterrent to hackers. However, most systems are set up such that you must 
activate WEP or WPA to enable wireless protection. Because WEP and WPA are 
turned off by default, many, perhaps most, home networks are vulnerable to 
intruders. WEP is not perfect, but with so many unprotected networks in your 
neighborhood, simply having it enabled is enough to send hackers down the street 
(or hall in an apartment building) to an easier target.
The primary difference between WEP and WPA is the handling of the encryption 
key. WEP uses the same encryption key, whereas WPA constantly changes the 
encryption key. With WPA, the hacker has very little time to break the key.
To turn on WEP or WPA encryption, navigate to the wireless setup screen on 
your gateway and choose an encryption method. WPA has a higher overhead and 
may slow the network more than the more straightforward WEP; however, WPA 
ch10.indd   185ch10.indd   185 2/22/2005   1:20:27 PM2/22/2005   1:20:27 PM