Security in Security in Wireless Networks
|20.4.2017||Posted by electronics51 under E-shopy|
Security in Wireless Networks
Home Security Camera allow for added flexibility in the placement of cameras and other networked devices throughout the system, but they require added security measures. WLANs are not necessarily bound by the walls of the buildings they serve, which open them up to security issues not faced with wired solutions. Due to the nature of wireless communications, everyone with a wireless device within the area covered by the network can potentially access its applications. To address these concerns, there are a number of different methods for securing wireless networks, including Wireless Equivalent Privacy (WEP), WiFi Protected Access (WPA), and WiFi Protected Access 2 (WPA2), plus a number of proprietary solutions.
WEP encrypts data transmitted over the WLAN. Once WEP has been established, other typical LAN security mechanisms such as password protection, end-toend encryption, virtual private networks, and authentication can be put in place to further ensure privacy. WEP adds encryption to the communication and prevents people without the correct key from accessing the network. However, the encryption code in WEP is static, which makes it vulnerable to attacks with inexpensive offthe-shelf software. Therefore it should not be the only method used to secure a wireless network.
For even higher 3G Wi-Fi Camera , WPA2 should be used. WPA2 uses Advanced Encryption Standard (AES) instead of TKIP. AES is the best encryption available for wireless networks today and is currently being used by the U.S. Government to secure sensitive, but not classified information. WPA2 is also referred to as 802.11i. Some vendors have established proprietary modes of securing information on a wireless network. While these systems may be very secure, keep in mind that these can become cumbersome and difficult to manage when working with a variety of vendors on an installation.
WPA was created as a response to flaws in WEP. WPA works with most wireless network interface cards. With WPA, the access key is changed with every transmitted frame using Temporal Key Integrity Protocol (TKIP). This makes it much more secure, and it is now considered the basic level of security necessary for wireless networks.
Using the Wireless Security Camera System, AIS deployed a wireless option and later discovered an extensive drag racing operation that was using the industrial park late at night for races. AIS worked with the Chicago Police Department, which was able to bust the ring, impound more than 100 cars, and make more than 300 arrests. While wireless networks have many benefits, there are still a few drawbacks. Wireless networks can affect the frame rate and latency of video delivery, and bandwidth is affected by the distance from the device to the access point. Wireless networks are also susceptible to interference by other wireless technologies and systems.
Wireless networks can have a profound affect when used in areas it would be otherwise impossible to deploy a surveillance system. Ace Internet Solutions (AIS) installed a Wireless Home Monitoring when it moved to an industrial park in Chicago. There had been a rash of vandalism and theft in the area, and to help combat the problem, the company wanted to install a surveillance system to monitor an area which encompassed nine square blocks.
“Because all of the network cameras were set up outdoors, running data cabling to each of them would have been too costly and difficult to maintain,” said Jeff Holewinski, president of AIS. “With a wireless connection, the cameras can transmit images no matter where they are, even from the top of light poles.”