Security of Wireless LAN
What is Wireless LAN
And wireless LAN uses radio waves, it is one of the mechanisms to send and receive data in electronic devices and game consoles such as PCs and smartphones. Will not many people have seen this site your computer or smartphone by using a wireless LAN now. Various places such as stores and companies house, it has been used in the scene for the room can also be used in the room has been drawn away from the internet, without the need for any cable, which is very convenient.
The wireless LAN can be intercepted
The wireless LAN communicate using radio waves. It can also be used in a remote location, there is also the fact that you are able to intercept the radio waves, even from a distance it's hard to understand also. Sense can be described as similar to those that call on your cordless phone to eavesdrop on a commercial radio and the possible.
You will be able to intercept if there is a software special cordless handset wireless LAN that can be Rather, if anything, we need equipment special something to intercept, to receive radio waves of the same wireless LAN, and personal computers. Software can be obtained on the Internet. Although it is a little hard for you to use, so you can also be used in a junior high school extracurricular activities As mentioned in another page, he does not mean terribly much.
If anyone intercepts, the communication content will not be seen because LAN wireless communication usually communications to encrypt.
You must enter the password when you connect your computer to the wireless LAN in this way.
We encrypt the communication in wireless LAN by using this password (It is called password, pre-shared key, and a variety of security keys, etc.).
The mechanism for the safety of the system, such as security and encryption used in wireless LAN, there is something like that shown in the following diagram.
|Communication standards||IEEE 802.11b||IEEE 802.11g||IEEE 802.11a||IEEE 802.11n|
|Authentication method||WEP||Preshared Key||Certificate Authentication|
It must spend high-performance computers and a huge amount of time after analyzed the encrypted communication, in order to know the password used for encryption, stealing a glance of contents of communication.
Rather, as this happens are made.
However, that WEP encryption in this table, by the method can be analyzed in ten second.
When is connected to the wireless LAN, automatically WEP key is parsed, it is less secure encryption.
Using encryption WEP cannot be estimated.
Now, you can use the wireless LAN security safely by using a combination of AES encryption and WPA2.
Past cases Unauthorized use of wireless LAN
Arrest of the university official who used others' wireless LAN by plagiarism and performed cracking.
Private university in Tokyo staff that made the unauthorized access to the server at the University who worked has been arrested.
In a car that was parked on the street, staff have made unauthorized access to the server of the University, and connected to the Internet using the wireless LAN of others without permission.
WEP key in this case has not been analyze, the security did not take anything
In this case, there is a possibility that human remains recorded which is installing a wireless LAN access point, would have been Stumble into crime.
マスタリングTCP/IP入門編第5版 竹下 隆史 (著), 村山 公保 (著), 荒井 透 (著), 苅田 幸雄 (著) 発行所：株式会社オーム
なれる！SE6 らくらく実践サイドビジネス 巻末付録立華の優しいIT説教部屋 夏海公司（著） 発行所：アスキーメディアワークス 2012年2月10日初版発行 2012年2月29日再版発行
IT用語辞典 e-Words 無線LANとは【WLAN】 - 意味/解説/説明/定義 ： IT用語辞典
ウィキペディア フリー百科事典 無線LAN - Wikipedia