Executive Briefing: Wireless Network Security

White Paper
Wireless Network Security
Introduction
5
Wireless Network Security
Introduction
Wireless network (WLAN) technology is the fastest growing segment of the communications market.
According to Gartner Research, worldwide shipments of WLAN units are forecasted to grow at an annual rate
of 42% through 2007.
The major driver fueling this growth is the strong return on investment afforded by much lower installation
costs, higher availability, and mobile data connectivity. Another significant advantage of WLAN technology is
that there is no “killer app” required to deploy wireless networks. WLAN components plug into the existing
infrastructure as simply as extending a phone line with a wireless phone.
Unlike traditional network technology adoption that starts with enterprises and moves to the SOHO and
home markets as the technology matures, WLANs are being adopted in the opposite order. While many
corporations and businesses are adopting wireless LANs, the SOHO and home users are adopting WLANs at
a much faster pace.
By removing the need to wire a network in the home, the cost of adoption and benefit of mobility within the
home and low cost of components make wireless networking a low-cost and efficient way to install a home
network. This segment of the market is much less aware and concerned about the security implications
associated with wireless networks.
At the same time, wireless adoption within the corporate and medium-sized businesses has been severely
inhibited by security concerns associated with placing sensitive corporate data over the air. While home users
are less aware and less concerned about the security implications associated with wireless networks, WLANs
have struck a nerve with security conscious IT departments.
Until recently, there has been no straightforward, cost effective way to deploy wireless security. IT
departments have been forced to either forbid the deployment of wireless networks, overlook the security
concerns, or install costly VPN solutions to build protected data tunnels between each wireless user, and the
core network.
This paper discusses the 3 layers of wireless security and the options available for securing the network:
Physical layer encryption, including WEP which has proven ineffective against hackers and intentional
intruders;
802.1X standards-based security which provides cost effective, easy to use network security; and
VPN-based security for the most security conscious requirements.