Published: 28 Sep 2011
In an environment with both computers and smartphones, how will Wi-Fi systems cope with ad hoc network creation?
In a recent Wi-Fi trial I was running, there was ad hoc network creation from smartphones, in particular, early iPhones). How can we overcome this problem?
Business wireless LANs are facing increased RF competition from consumer electronic devices that form their own little Wi-Fi networks. Two very common examples include printers that support peer-to-peer print job submission by Wi-Fi clients and smartphones that support "personal wi-fi hotspot" 3G/4G Internet connection sharing.
Do you have a question for our experts?
Submit your question directly to our editors at firstname.lastname@example.org
Historically, printers have advertised 802.11 ad hoc mode SSIDs; these are now being gradually replaced by Wi-Fi Direct. True ad hoc mode SSIDs are trivial for a Wireless IPS or WLAN with built-in rogue AP scanning to detect and correctly classify. Even manual scanning tools like NetStumbler can easily spot ad hoc mode SSIDs. Dealing with ad hoc network creation instances usually involves:
1) Avoiding co-channel interference by letting your WLAN auto-change channels
2) Preventing legitimate users from connecting to unauthorized ad hocs by configuring client connection policies and/or instructing your WIPS to block ad hoc connections
Unfortunately, smartphones that advertise personal wi-fi hotspot SSIDs can be more difficult to reliably classify and deal with. Some personal hotspots are easily recognized by manufacturer or carrier-supplied SSIDs (e.g., "Lisa's iPhone"). But a blacklist based on SSID is easily evaded by reconfiguring personal wi-fi hotspot name. Some personal hotspots can also be recognized by MAC address (specifically, the manufacturer's OUI). However, OUI blacklists are also far from foolproof and onerous to maintain. As a result, we end up with an apparent explosion of transient rogue APs that move around.
So how does this complicate mitigation or avoidance? First, letting your WLAN auto-change channels to avoid channels used by these migratory little rogues could be disruptive. To minimize this, if your legitimate Wi-Fi client base supports 5GHz, consider maximizing 5 GHz use, since many smartphone rogues are (at least currently) 2.4 GHz-only. Better yet, use a signal strength or other threshold to tune your WLAN's RF management to avoid over-reacting to weak, short-lived smartphone rogues.
Read more of Lisa's wireless advice
Unauthorized network access: Neighbors pose a network security threat?
Enterprise wireless connection policy: Navigating cellular vs. WiFi
Wifi replacing Ethernet? An expert weighs in on the possibilities
Second, letting your WIPS block connections to these smartphone rogues could hurt visitors, neighboring businesses or legitimate users if device classification is weak. Address this by learning how your WLAN and/or WIPS classifies personal hotspots. For example, do smartphone rogues trigger Soft AP or Host AP, or potential Honeypot AP alerts? Can your WIPS use connectivity traces or device fingerprinting to classify personal hotspots as external APs? Can you augment classification by configuring basic SSID or OUI blacklists? Once you understand how smartphone rogues are classified, you can make an informed decision about whether and where to enable WIPS blocking.
Unfortunately, I don't have a silver bullet recommendation to solve this. Smartphone hotspots are escalating and clogging our airspace; many are devices that lie beyond IT control. But recognizing where they exist and assessing their impact on your WLAN are critical first steps to responding appropriately to this unwelcome competition.
Lisa Phifer owns Core Competence Inc., a consulting firm specializing in network security and management technology. Phifer has been involved in the design, implementation, and evaluation of networking, security, and management products for over 20 years. At Core Competence, she has advised companies large and small regarding security needs, product assessment, and use of emerging technologies and best practices. Before joining Core Competence, Phifer was a Member of Technical Staff at Bell Communications Research, where she won a president's award for her work on ATM Network Management. Phifer teaches about wireless LANs, mobile security, and VPNs at many industry conferences and webinars. She has written extensively about network infrastructure and security technologies for numerous publications, including Wi-Fi Planet, ISP-Planet, Business Communications Review, Information Security, and SearchSecurity. Phifer's monthly WLAN Advisor column is published by searchMobileComputing.
- Myth vs. Reality: Cloud-Managed Wireless LAN and the Primary Access Network –SearchSecurity.com
- WLAN Best Practices: 10 Questions to Ask When Evaluating Solutions –SearchSecurity.com
- E-Guide: Wireless LAN access control: Managing users and their devices –SearchSecurity.com
- Ensuring an Optimal Wi-Fi Experience: Best Practices –SearchSecurity.com
Dig Deeper on Wireless LAN (WLAN)
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.