Showing posts with label IOT. Show all posts
Showing posts with label IOT. Show all posts

Wi-Fi security issues – a 5 step guide on the Common Threats and how to manage them

Today’s Wi-Fi networks are now more secure than the typical wired network in the same building. While that may seem like a bold opening statement, today this is often the case.



It is true that WLANs got off to a chequered start 20 years ago, with attackers finding ways around the early security procedures and protocols in place. Consequently, though, the industry devoted a great deal of effort and innovation towards making WLANs much more secure – and they succeeded. There are, however, still challenges in securing any network.
As we know, wireless “leaks out” to the surrounding environment, which means passers-by can see and attempt to connect to any network they choose. As a response, we need to put steps in place to mitigate this threat. For wired networks, physical barriers with locks on the doors and containment physically within the building are the traditional wired networking means of defense. However, if a person with malicious intent is able to gain physical access, perhaps through social engineering, or tail-gating, a device can be connected and access gained which, then, is an opportunity for an attack to commence.
So how have WLANs been addressing security concerns? What has the result of all that investment and innovation been?

Wi-Fi Security Methods

The Gold standard is the use of Digital Certificates. This method is preferable because, unlike user-created passwords, certificates are virtually impossible to replicate. However, this method is also the most complex to deploy for the network administrator. Unless a friendly, user self-service Enrolment System is used to automate the authorization, creation, and distribution of certificates and secure WLAN setup for users can become a time-consuming task.
The Silver standard is a username and password-based authentication – often linked to a user database such as Microsoft Active Directory. This works well, but network administrators need to implement with care, making sure that proper server certificates are deployed to ensure users address a legitimate server, and that user passwords are suitably complex. Interestingly, both password complexity and frequency of change need not be as onerous as imagined and are well explained here.
We must accept that there will be a need to support some devices that cannot support the gold or silver methods. Such equipment often compromises devices that have crossed over from the home market to the workplace as digital transformation has taken hold – smart speakers, video streamers and casters, as well as other IoT devices. Limited to Pre-Shared Key authentication, in the commercial world, the use of a unique static key per device, called Dynamic Pre-Shared Key, provides enhanced security and limitation of a breach if one key is discovered.
2019 will see the introduction of a further security enhancement called WPA3. This new Wi-Fi security standard will replace WPA2, and improve the encryption strength and ease of setup of the methods discussed above.
Role Based Access – with a suitable WLAN infrastructure, the above access methods can map to user roles. Define what is allowed for a user type and apply rules accordingly. Roles provide a plethora of controls, from VLAN allocation, through to simple port and protocol-based firewall rules up to application-based recognition and control, including URL filtering.




via Ruckus

How to Prepare Wi-Fi Networks for Smart Devices


Before you plug in and fire up those smart light bulbs, appliances or television you need to prepare your Wi-Fi network to ensure your speeds and security are not affected by the presence of this new equipment.

It is estimated by research firm IHS that the IoT market will grow from an installed base of 15.4 billion devices in 2015 to 30.7 billion devices in 2020 and 75.4 billion in 2025. Our washing machines, coffee pots, thermostats, lights, probably even the toilet and the kitchen sink will all be hooked up to our home Wi-Fi networks. While this will likely lead to more convenience when it comes to home management and maintenance it will also create bottlenecks on home networks slowing down your smart phone, tablet and laptops.
Before you plug in and fire up those smart light bulbs, appliances or television you need to prepare your Wi-Fi network to ensure your speeds and security are not affected by the presence of this new equipment. Most people plug in their Wi-Fi router and never worry about it again, unless they are calling their internet provider to complain about an outage or slow connection. It might not be your provider though, your type of router, where it is placed, the bandwidth of the router and the number of devices you have connecting to it at home could be to blame for your Wi-Fi headaches.

1. Location, location, location. Router location plays a major role in the range and efficiency of a Wi-Fi network. Placing a router in a cabinet or an out of the way room might make your home look less cluttered but this also blocks the signal with doors and walls, plus everything inside your walls, from reaching the areas of your home where you are trying to use your devices. Use a Wi-Fi analytics app to check your Wi-Fi signal strength at each of the locations that you plan to put smart home devices. Be sure that the signal strength is at least 60% at each of those locations. Also check the signal strength where you normally sit to use your laptop, tablet and phone.

2. Flex Wi-Fi muscle. If you have a smaller home and need more coverage look for a high-power router that has more internal and external antennas than your current router model. If you have a larger home, consider using range extenders or a whole home Wi-Fi system.

3. Read the label. When shopping for a new router some of the key terms to look for include AC1900 as a minimum speed and MU-MIMO Technology. While your connection speeds will ultimately be determined by the level of speed you pay for through your internet service provider if you do not have a router equipped to handle the fastest speeds available today you will always experience a slower connection. MU-MIMO is desirable in homes with multiple devices and internet users. Instead of creating a queue of connection requests that are handled in order like a traditional router would do, MU-MIMO routers serve data to more devices at once without limiting speeds. This is critical in homes with smart devices as the total count of devices can add up quickly.

4. Make it ironclad. We all know that hackers have a variety of ways to trick us into giving them access to our digital accounts and methods of stealing account information and passwords from companies we do business with; however, that doesn’t mean we should just give up and let them into our networks freely. You need to make sure your network is secure as possible. If you are deciding between two routers and one offers added layers of security with virus protection and malware detection, for example, pick the one that is focused on security. Also, be sure to set up complex, hard to crack passwords. Never leave your Wi-Fi open without a password. Even guest networks should require one for access. Also, any time you have an issue with your email being hacked or one of your online accounts is breached, change your Wi-Fi password along with all your other accounts, just to be safe.
To recap;

  1. Position your router in an optimal location, as central as possible.
  2. Test your Wi-Fi signal strength with a signal strength tool, be sure to check all locations where smart devices will live.
  3. If weak spots are found, try a High-Power Router or a Range Extender. If you want a seamless network, try a Whole Home Wi-Fi System.
  4. Use a router that supports at least AC1900 speeds and MU-MIMO technology.
  5. Keep your network secure with hard-to-crack passwords and built-in protection from other web threats like Malware.

via HomeToys

8 Amazing Facts About WiFi that You Probably Did Not Know


The internet of things (IoT) has become almost a part of our necessity lately. The fundamental enabler of IoT is WiFi.
WiFi has made lives easier and better. It has also played a huge role in bringing us together no matter what your geographical locations are.
In this article, I have discussed a few extraordinary and mind-blowing facts about WiFi that you have probably not heard of in the past. Take a peek.
1.       The term WiFi was invented by Interbrand
You probably know that the term WiFi stands for Wireless Fidelity. Well, that is actually wrong. But don’t worry. You aren’t the only person to think in that way. Most people believe that the term WiFi stands for wireless fidelity.
 The wrong notion cropped up from a nonsense advertising slogan that stood for “The standard for ‘Wireless Fidelity’.”
The term WiFi was actually invented as a play on words of the term, Hi-Fi (High Fidelity).
2.       The WiFi revolution is in full flow
WiFi has actually changed the world. Vinton G. Cerf, the father of the internet predicted in 1992 that IP would appear on everything. Well, it finally happened.
A large number of WiFI enabled thermostats, light bulbs, monitoring and control systems, wearable devices, security gadgets etc. are available in the market these days. IPs even appear on daily objects ranging from walking sticks to T-shirts.
So you see, the revolution has already happened.
3.       WiFi has the ability to travel more than what you think
You might develop this notion at times when you fail to get a stable internet connection I your room. If you think like that, you aren’t exactly right in all aspect.
Many WiFi networks that are typically made for home use normally have a range of around 30m. So your point might be justified to this instant. But there are certain special networks that can travel more than 275kms in distance.
Such additional coverage is achieved by network technicians though special WiFi range extenders.
4.       Make all connections appear seamless through a single technology
Imagine purchasing a WiFi supported TV, a sprinkler system, a thermostat or even a washing machine and getting them on the same network used by your smartphone, tablet and computer. You can do that with WiFi.
One network to rule them all.
5.       With the increase in number of connected devices, security has increased by several levels
Our lives are getting more and more automated with the passage of time. Thus, it has become absolutely essential to practice safe connecting habits.
WiFi comes with industry standard security that customers can rely on with their eyes closed.
A WiFi network having WPA2 provides both privacy for communication and security at the same time. For maximum safety, it’s advisable for your network to include only those devices built with the latest security technology called WPA2 (WiFi Protected Access 2).
Almost all WiFi Certified devices implement WPA2.
6.       United States has stronger WiFi signals than Europe
That’s because the regulatory authorities in the United States allow transmission in higher power than that of Europe resulting in stronger signals.
7.       Wireless performance will drop if many wireless devices get on the connection
Wireless performances are sure to drop if a substantial number of devices get on it.
Many routers theoretically announce that they can support more than 255 devices at a stretch but in reality, if 255 devices get on it at the same time, the internet connection will barely stay usable at that point.
The major culprit is bandwidth which varies greatly depending on the type of your router.
Another point that you should remember is that if there are a number of WiFI networks around you, your connection is bound to slow down as multiple signals result in interference disrupting the clarity of your signal.
8.       Microwaves affect WiFi networks
Microwave ovens emit a huge amount of energy when they are in use. This can interfere with your WiFi signal.
Microwave ovens emit about 1000W of energy which is almost 10,000 times more than your WiFi signal. If it comes in contact with your network, it’s definitely going to result in a significant disruption of your WiFi connectivity.
via techsling

5 Tools to Check if Someone is Using my Wireless Network (WiFi)

WiFi technology is everywhere these days and it seems almost every electronic device around has a wireless network connection of some sort. Laptops, tablets, smartphones, digital cameras, printers, gaming consoles, smart watches and many other devices can connect to each other or the internet through a WiFi connection. But a wireless network setup also presents its own set of problems when it comes to your own home network and the devices attached to it.
Naturally, setting up your own WiFi network with adequate protection like WPA2 and a strong password is vital, but that still doesn’t mean people you don’t know about aren’t using your network without your knowledge. It’s entirely possible friends, neighbors or family members have shared the WiFi credentials with others and people you don’t even know could have access to your network and your shared files. Even though many routers have additional security measures such as MAC address filtering, these might not be configured or someone has circumvented them.
A lot of modern routers will give you a list of the wired and wireless devices making a connection to the network, but some do not and some people wouldn’t actually know how to find that information. Another simple way is using a tool to get the list of connected devices, here’s 5 for you to try out.
Read More: https://www.raymond.cc/blog/how-do-i-know-if-someone-is-using-my-wireless-network-wifi/


1. Wireless Network Watcher
Wireless Network Watcher is by Nir Sofer and is another one of his many utilities that simply does what it says on the tin. The good thing is it requires no setting up of IP address ranges and starts scanning your main network adapter automatically for connected devices. If you wish to scan a different adapter or a custom IP address range, use the Advanced Options by pressing F9.
wireless network watcher
Scanning the IP range is fast and only takes a few seconds, after which you get information like IP, device name, MAC address, adapter manufacturer, detection count and activity state. While Wireless Network Watcher is open a background scan continuously looks through the IP range to detect new and disconnected devices, you can set a tray balloon and audio warning when devices are detected or disconnected. The background scan interval can be set in seconds through the Advanced Options windows (F9). A portable or installer version is available.

2. SoftPerfect WiFi Guard
WiFi Guard is like a cutdown and more basic version of the excellent SoftPerfect Network Scanner which is more suited just for detecting unknown or unauthorized network connections. This tool will scan your network for connected devices and rescan every xx minutes, popping up a message if an unknown connection has been found.
softperfect wifi guard
If you have more than one active network adapter the program will popup the settings window on launch to select the adapter you want to scan, otherwise you will be taken to the main window where pressing Scan Now will detect all devices connected to the network. For every red marked connection you know is authorized, double click on it and tick the “I know this computer or device” box, that will tell the program to ignore the device on rescans as it’s known. While running or minimized WiFi Guard will rescan between 0 and 60 minutes (default is 30 mins) and popup a message on screen if a new unknown device has been detected.
As mentioned above, there is Softperfect Network Scanner  which is one of the most comprehensive scanning and administration tools of its type. It can also be used for scanning and identifying wireless connections but it won’t scan every number of minutes and warn you on unknown connections. Both WiFi Guard and Network Scanner have portable and installer versions.

3. Advanced IP Scanner
This is an all round network administration tool that can do a number of tasks in addition to scanning your network for connections. There’s also remote options to Wake-on-LAN and shutdown, connect via HTTP/FTP as well as remote control with Remote Desktop and Radmin. Of course, those features are unnecessary for simply scanning your network for wireless connections.
advanced ip scanner
By default Advanced IP Scanner will set the address ranges for all connections on the computer, only the range that the WiFi connections are likely to be on will need to be scanned, such as 192.168.0.1 – 192.168.0.254. If you only have one active connection, there’s no need to touch the IP range. After the scan, all connections will show along with the wireless device manufacturer, MAC address and its name. Advanced IP Scanner doesn’t have to be installed and the option to run it as portable can be selected when running the setup executable.

4. Angry IP Scanner
Angry IP Scanner is a multi platform tool that works on Mac and Linux as well because it’s Java based, this will obviously mean the Java Runtime Environment needs to be installed on your computer. The tool simply pings every IP address in the selected range for a response and then displays the result along with the information you ask for in the Fetchers window.
angry ip scanner
To select a range of addresses to scan, enter them yourself or click the IP button and select the correct network adapter. Then click the drop down to its right to choose the range, /26 will scan up to 63, /24 will scan up to 255 and etc. You can also choose our own IP list text file if you have a complicated setup. The scanning process is quite fast because the program scans using multiple threads. To see the result of all scanned addresses, go to Tools > Preferences > Display and choose “All scanned hosts”, this will reveal other possibly connected devices that are not responding to pings. Portable and installer versions are available.

5. Who Is On My WiFi
This tool is a little different from the others because its main task is to identify the computers on your network and warn you when unknown or unidentified connections are made. Unfortunately one of its most useful functions of blocking unknown or suspicious connections is only available if you sign up for a paid subscription, plans start at a slightly steep $9.95 per month. The free version however, still lets you scan and find devices on your network.
who is on my wifi
The first thing required is to configure the address range to scan from the default by clicking the Settings button and entering the the range you need for your network, such as 192.168.0.1-254. If you are not sure go to the Diagnostic tab in Settings and click “Detect IP Ranges” to see what your network is currently using. Then run a scan and devices on the network will be identified. Select all known connections in turn and set their state to KNOWN from the drop down, then optionally give each a description.
If you keep Who Is On My WiFi running in the background it pops up a visual and audible message when an unknown network device is detected, by default it will scan every 5 minutes although you can change this time to between 2 and 10 minutes in the settings. Make sure to close Who Is On My WiFi from the tray icon if you don’t wish to use the monitoring feature.
Note: We did test a few other network scanning tools called LanSpy  and Lizardsystems Network Scanner  but they were quite inconsistent in detecting wireless networks. Sometimes they would show up, sometimes they would be missing even though the tools in our list had no such difficulty. If you want to use those tools to search for wireless connections, do so with caution.