Security Concerns Mount For Wireless Networks - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Infrastructure

Security Concerns Mount For Wireless Networks

Security is top-of-mind for businesses managing wireless networks, especially as they start adding new applications, such as voice over IP. Meru Networks' new offering scrambles malicious code at the radio-frequency signal level.

Meru Networks plans to offer in March an intrusion detection and prevention system that secures wireless local-area networks by scanning for intrusions at the radio-frequency signal layer.

Meru's Security Services Module scrambles the signals and jams the transmission of malicious code coming via rogue access points or other means, says the company. The system scans for threats without disruption while networks are transmitting data and voice packets.

The module is software-based and doesn’t require any hardware additions. Intrusion detection and prevention systems for wireless networks from other vendors often require an overlay of specialized sensors that scan radio-frequency signals for attacks. Meru’s module, priced at $2,500, is designed to be affordable for small and medium-sized businesses.

Security is a top concern for businesses and organizations deploying or managing wireless networks, especially as they start adding new applications, such as voice over IP. Radio frequency level security can prevent intruders from listening in on voice packets that travel over wireless networks or injecting bad packets that confuse the phone system and wreak havoc. "Voice, as well as video, will be the new applications,” says Songwu Lu, a professor in the computer sciences department at the University of California, Los Angeles, who has tested Meru's wireless access points and controller in his research and graduate courses. “For them, rogue access point detection and location privacy is the key," he says.

The San Antonio Community Hospital is using Trapeze Network's RingMaster management software to monitor rogue access points on its wireless network. The 400,000-square-foot hospital has installed about 250 Trapeze access points, which use two radios: One for handling user traffic and the other for scanning. "It lets us know if there's any attempts to connect to our network with unauthorized equipment," says Irv Hoff, the hospital's manager of converged networks.

Hoff says past challenges include the access points shutting off every five seconds during security scans. But the newer version of Trapeze's software solves that problem by designating specific radios to do the scans.

The hospital plans to implement voice-over-IP onto its wireless network so that doctors can communicate with other physicians outside the hospital for referrals and consults. It’s evaluating cordless phones from Nortel and wireless network badges, that physicians would wear, speak and listen through, from Vocera Communications. Says Hoff, "We now feel comfortable to deploy voice because we've locked down our wireless security."

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Slideshows
IT Careers: Top 10 US Cities for Tech Jobs
Cynthia Harvey, Freelance Journalist, InformationWeek,  1/14/2020
Commentary
Predictions for Cloud Computing in 2020
James Kobielus, Research Director, Futurum,  1/9/2020
News
What's Next: AI and Data Trends for 2020 and Beyond
Jessica Davis, Senior Editor, Enterprise Apps,  12/30/2019
White Papers
Register for InformationWeek Newsletters
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Video
Current Issue
The Cloud Gets Ready for the 20's
This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Get it today!
Slideshows
Flash Poll