Wireless Local Area Network Security (WLAN Security)
Definition - What does Wireless Local Area Network Security (WLAN Security) mean?
Wireless local are network security (WLAN security) is a security system designed to protect networks from the security breaches to which wireless transmissions are susceptible. This type of security is necessary because WLAN signals have no physical boundary limitations, and are prone to illegitimate access over network resources, resulting in the vulnerability of private and confidential data. Network operations and availability can also be compromised in case of a WLAN security breech. To address these issues, various authentication, encryption, invisibility and other administrative controlling techniques are used in WLANs. Business and corporate WLANs in particular require adequate security measures to detect, prevent and block piggybackers, eavesdroppers and other intruders.
Techopedia explains Wireless Local Area Network Security (WLAN Security)
Security has remained a major concern in WLANs around the globe. While wireless networks provide convenience and flexibility, they also increase network vulnerability. Security threats such as unauthorized access, denial of service attacks, IP and MAC spoofing, session hijacking and eavesdropping can all be problems for WLANs. To counter these threats, various standard authentication and encryption techniques are combined with other access control mechanisms. These protocols, devices and techniques collectively secure the WLAN a level that equals and even exceeds wired LAN security.
Some of the technologies employed in WLAN security include:
- Wired Equivalent Privacy (WEP): An old encryption standard used to overcome security threats. WEP provides security to WLAN by encrypting the information transmitted over the air so that only the receivers with the correct encryption key can decrypt the information.
- WPA/WPA2 (WI-FI Protected Access): Improved on WEP by introducing Temporal Key Integrity Protocol (TKIP). While still using RC4 encryption, TKIP uses a temporal encryption key that is regularly renewed, making it more difficult to steal. In addition, data integrity was improved through the use of a more robust hashing mechanism.
- Wireless Intrusion Prevention Systems/Intrusion Detection Systems: Intrusion detection and prevention focuses on radio frequency (RF) levels. This involves radio scanning to detect rogue access points or ad hoc networks to regulate network access. Advanced implementations are able to visually represent the network area along with potential threats, and have automatic classification capabilities so that threats can be easily identified.
- IEEE 802.1X
- Wireless Local Area Network (WLAN)
- Local Area Network (LAN)
- Wide Area Network (WAN)
- Microcom Networking Protocol (MNP)
- Internet Protocol (IP)
- Information Assurance (IA)
- Information Security (IS)
- Security Architecture
- Hypertext Transfer Protocol (HTTP)
- Transmission Control Protocol/Internet Protocol (TCP/IP)
- IP Spoofing
- Session Hijacking
Experts Share the Top Cybersecurity Trends to Watch for in 2017
Join thousands of others with our weekly newsletter
The 4th Era of IT Infrastructure: Superconverged Systems:
Approaches and Benefits of Network Virtualization:
Free E-Book: Public Cloud Guide:
Free Tool: Virtual Health Monitor:
Free 30 Day Trial – Turbonomic: