CHAPTER 10 Privacy and Security
185
Security for Wireless Home Networks
Most home network security threats come from Internet hackers, but to get to your
network, they must fi nd a way to get past your fi rewall—not an easy task. With the
rapid acceptance of wireless home networking, a new breed of hackers has emerg-
ed. Wireless hackers tap directly into your wireless network, thus bypassing the
fi rewall. Wireless LANs are installed on the private side of the fi rewall, so the
fi rewall offers no protection from wireless hackers. Wireless hackers can tap into
your home network from the house next door or from a car parked at curbside in
front of your house. Unless you are constantly checking the status of the LAN, you
are probably unaware that your network is being violated. Once online, the wireless
hacker’s PC becomes just another peer node on your LAN.
WEP and WPA Encryption
Virtually all network gear supports a security feature called Wired Equivalent Privacy,
or simply WEP. WEP uses data encryption techniques to scramble information passed
between wireless devices. A hacker attempting to tap into your WEP-enabled wire-
less network would fi nd only meaningless bits. The AP and client device on the
home network shares an encryption key that is used to scramble and unscramble the
encrypted information sent via wireless links.
Wi-Fi Protected Access, or WPA, is an enhanced encryption technique that is
available on most modern network gear (after 2004). WPA employs authentication
via user ID and password and uses more sophisticated encryption. Once the
authorized client PC is authenticated, the AP sends a temporary encryption key that
is valid only during the current communications session.
WEP is not as secure as WPA, but having any encryption method in place is a
major deterrent to hackers. However, most systems are set up such that you must
activate WEP or WPA to enable wireless protection. Because WEP and WPA are
turned off by default, many, perhaps most, home networks are vulnerable to
intruders. WEP is not perfect, but with so many unprotected networks in your
neighborhood, simply having it enabled is enough to send hackers down the street
(or hall in an apartment building) to an easier target.
The primary difference between WEP and WPA is the handling of the encryption
key. WEP uses the same encryption key, whereas WPA constantly changes the
encryption key. With WPA, the hacker has very little time to break the key.
To turn on WEP or WPA encryption, navigate to the wireless setup screen on
your gateway and choose an encryption method. WPA has a higher overhead and
may slow the network more than the more straightforward WEP; however, WPA
ch10.indd 185ch10.indd 185 2/22/2005 1:20:27 PM2/22/2005 1:20:27 PM