Location technology enhances wireless network security

Wireless is beginning to provide a real alternative to wired Ethernet

The acceptance of centralized wireless LAN architecture has significantly reduced costs and simplified the task of managing, securing and upgrading wireless systems, all of which have resulted in rapidly growing deployments.

What's more, with the advent of 802.11n and mesh technologies, wireless is beginning to provide a real alternative to wired Ethernet. But for that movement to gain ground Wi-Fi must offer high-level security and reliability. What safeguards are in place to prevent unauthorized access? How does a network administrator see what is "unseen"?

While standards such as Wi-Fi Protected Access 2 (WPA2) and 802.11i provide new levels of wireless security, and are backed up by new monitoring and intrusion-protection tools, enterprises are increasingly interested in the benefits of combining IT security with physical security.

But it's been difficult for enterprises to add physical security to wireless. How do enterprises balance providing mobility to their workers and visitors while placing needed checks on this untethered freedom?

A company, for example, may not feel comfortable letting employees access sensitive information like HR, finance or new product documents anywhere the WLAN reaches. It might make sense to have mobility in the finance department but restrict wireless access to finance information beyond that department to prevent others from potentially seeing sensitive material.

That's where the concept of location-based security comes into play: restricting who has access to the WLAN based on where they are. Besides adding another layer of security, location controls -- combined with access rights -- can also prevent overburdening segments of the network (and preventing denial-of-service attacks) and restrict where visitors can access the WLAN.

Today's leading WLAN switches are capable of reporting the location of laptops or mobile devices using data collected by wireless access points. These so called "locationing" services have been used largely for tracking assets throughout an enterprise. In hospitals, for example, they are used to locate doctors and blood transfusion and surgical equipment. But the same technology can play a larger role in security in the form of geo-fencing.

Geo-fencing is a term used primarily to refer to the practice of limiting network access by mobile employees and/or visitors based on their geographic location and authorization status.

The user identity is established based on one or more IDs (such as RFID-enabled visitor badge and mobile Wi-Fi device) in conjunction with a location algorithm that will determine the position of that specific ID, allowing an appropriate level of network access to that person. The basic premise is that a virtual access fence is created around each mobile device and user.

This is how it works. The wireless switch "follows" a user throughout the building, granting or denying access to resources on the network based on his authorization status and whether he's in an approved designated area.

It also ensures access to the WLAN and network resources only when the ID card (physical security) is present with the assigned user and his mobile device. This significantly reduces the possibility of someone using another user's laptop or mobile device to access unauthorized information on the network.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Sujai Hajela

Network World
Show Comments

Cool Tech

Toys for Boys

Family Friendly

Stocking Stuffer

SmartLens - Clip on Phone Camera Lens Set of 3

Learn more >

Christmas Gift Guide

Click for more ›

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Michael Hargreaves

Microsoft Office 365/Dell XPS 15 2-in-1

I’d recommend a Dell XPS 15 2-in-1 and the new Windows 10 to anyone who needs to get serious work done (before you kick back on your couch with your favourite Netflix show.)

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Cathy Giles

Brother MFC-L8900CDW

The Brother MFC-L8900CDW is an absolute stand out. I struggle to fault it.

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?