SP 800-153 Guidelines for Securing WLANs (2024)

Table of Contents
Background Summary Notes FAQs References

Status: Final Published

Date: February 2012

Region: United States

Document: Link

Background

The NIST SP 800-153 document was developed to provide security guidance for WLAN connections based on the IEEE 802.11 specification. This standard is meant to supplement, not override any other NIST documents, guidelines, and standards related to communication security. The SP 800-153 is considered one of the vital digital security documents aimed at providing the groundwork for a significant portion of IoT connections, including applications that relate to the smart city/automotive combination.

Summary

WLAN Network Architecture: WLAN connections are characterized by the wireless communication of networking devices within a certain geographic area (key applications include building automation or industrial settings). WLAN depends upon the following three components: 1) the gateways/routers that allow the connection, 2) the devices (CE) that connect to said routers, and 3) the Wireless Access Points (WAPs or simply APs), which are the hardware components required to allow connectivity, even if there is no router in range. Different security requirements are needed in order to protect the network and its components, and the document focuses on suggestions related to the networks themselves rather than the devices that connect to them.

Security Assessment and Monitoring: The NIST makes another important suggestion regarding WLAN security assessment and monitoring. These two terms describe the periodic or continuous processes that relate to an organization assessing and monitoring the security aspects, traffic, and behavior of their WLAN networking systems. A great deal of the suggestions relate to attacker tunneling from WLANs to wired connection for dual systems, which is not relevant for this security study.

Passive Threats: The SP 800153 states that attackers can passively eavesdrop on WLAN connections, gathering information about all involved parties, message content, and all related intelligence. Continuously monitoring car systems is a lot more challenging than enterprise settings. Monitoring for this threat is usually insufficient because the attackers are simply eavesdropping, not generating traffic. Therefore, implementers are advised to monitor car systems at predetermined time frames, or after any suspicious network shift. This can be achieved locally through the use of dedicated systems like Intrusion Detection and Prevention Systems (IDPS).

Active Threats: Fraudsters can also actively engage in DoS attacks, use replay attacks posing as legitimate users to request information from any connected system or online resource, and even modify any message sent. This case requires more sophisticated security tools. This includes systems that place a threshold over the number of requests (i.e., DoS prevention), make use of User and Entity Behavioral Analytics (UEBA) to effectively monitor traffic and abnormal user or system behavior, or even wireless IDPS sensors that can prevent rogue devices from spoofing the identity of another system. This is referred to as in-vehicle IDPS and can be used to detect anomalies in automotive ECUs.

Identify WLAN Security Requirements: As expected, all wireless connections are considered highly insecure when compared with their wired counterparts. Organizations should carefully plan out the security requirements for their target application, which may well extend into laws and regulations from governmental and regulatory bodies like the Department of Homeland Security or the Government Accountability Office (GAO). Each application has its own threat vectors and companies are expected to research these ahead of time in order to safely design the basic WLAN networking blueprint. For the task at hand, the following market segments are targeted: automotive, smart home, smart cities, and related applications like connected parking, in-car payments, etc.

Architecture Suggestions and Caveats: The NIST explicitly states that security architecture should not focus on the organization’s WLAN network, but also calculate how it will be affected by other networks that are accessible through it. Separating WLANs and addressing security concerns in a different manner should also be one of the top priorities (e.g., internal use versus external use, high-priority or critical sys- tems versus secondary functions, etc.). This measure is meant to address a serious security concern: network tunneling. Cyberattackers can essentially tunnel traffic and leap from one insecure, secondary sub-network (e.g., guests) to a higher-security one (e.g., corporate) based on architectural flaws that exist in the relationship between these two networks. This also applies to “dual” connections and devices that can connect to multiple wireless interfaces. This may include, for example, a laptop that is both wirelessly and Ethernet connected, or a smartphone device that connects both to public or other networks and an automotive system at the same time. Suggestions to address the above include:

  • Configuring the system to deny other network interfaces (or at least permit only some)
  • Deploy OTA updates or specialized software that allows connection in either WLAN or wired
    access, but not both simultaneously
  • Enforce host-based tools (gateway firewalls and intrusion detection/prevention systems) to
    prevent any external networks to access car systems
  • Account for the fact that CE or poorly coded third-party car infotainment apps may sometimes cause an override in the above measures

Notes

Note that some of the aforementioned insights follow the same pattern covered in the NIST’s SP 800-187 Guide to LTE Security. Many of the attacks are also quite similar, but relate to WAPs instead of cellular communications. They also follow similar analysis covered in the UNECE Recommendation on Software Update Processes. Taken together, all three aforementioned documents give a more complete picture regarding the three key threat vectors for securing communication in the connected car:

a) securing cellular connectivity and maintain data integrity and confidentiality, b) protecting OTA security updates and standardizing the manner in which said updates are addressed, deployed, maintained, and monitored, and c) addressing security for wireless access communication, which has a direct effect on all incoming-outgoing communication with certain smart city applications—also considered a vital aspect for the future evolution of the connected vehicle.

Published: August 19th, 2020

SP 800-153 Guidelines for Securing WLANs (2024)

FAQs

SP 800-153 Guidelines for Securing WLANs? ›

WLAN Security Configuration

WLANs are usually implemented as extensions to existing wired local area networks (LANs) to provide enhanced user mobility and network access. WLAN technologies are based on the IEEE 802.11 standard and its amendments.

What are the best ways to secure WLANs? ›

What can you do to minimize the risks to your wireless network?
  • Change default passwords. ...
  • Restrict access. ...
  • Encrypt the data on your network. ...
  • Protect your Service Set Identifier (SSID). ...
  • Install a firewall. ...
  • Maintain antivirus software. ...
  • Use file sharing with caution. ...
  • Keep your access point software patched and up to date.
Feb 1, 2021

What are the wireless security standards applied in WLANs? ›

WLAN Security Configuration

WLANs are usually implemented as extensions to existing wired local area networks (LANs) to provide enhanced user mobility and network access. WLAN technologies are based on the IEEE 802.11 standard and its amendments.

How do I secure my wireless LAN? ›

12 Best Practices for Wireless Network Security - WIFI Security
  1. Enabling Two-Factor Authentication (2FA) ...
  2. Using A Strong Password. ...
  3. Encrypting Data. ...
  4. Disabling SSID Broadcast. ...
  5. Using MAC Filtering. ...
  6. Enabling WPA3 Security. ...
  7. Using A VPN. ...
  8. Disabling Remote Administration.

Which of the following standard provides security to WLAN? ›

IEEE 802.11i is an IEEE 802.11 amendment used to facilitate secure end-to-end communication for wireless local area networks (WLAN).

Which encryption method is best for WLAN? ›

As the most up-to-date wireless encryption protocol, WPA3 is the most secure choice. Some wireless APs do not support WPA3, however. In that case, the next best option is WPA2, which is widely deployed in the enterprise space today.

What is NIST 800 153? ›

SP 800-153, Guidelines for Securing Wireless Local Area Networks (WLANs) | CSRC.

What are the 4 standards of WLAN? ›

The prominent among them are 802.11, 802.11a, 802.11b, 802.11g, 802.11n and 802.11p. All the standards use carrier-sense multiple access with collision avoidance (CSMA/CA). Also, they have support for both centralised base station based as well as ad hoc networks.

What are the five major components of securing the wireless 802.11 network? ›

5 Ways to Secure Wi-Fi Networks

Protect your Wi-Fi network from unauthorized access by using encryption methods, firewall tools, secured SSID software, VPN software, and wireless security software.

What are the 5 wireless network standards? ›

Different Wi-Fi Protocols and Data Rates
ProtocolFrequencyMaximum data rate (theoretical)
802.11ac wave15 GHz866.7 Mbps2
802.11n2.4 or 5 GHz450 Mbps3
802.11g2.4 GHz54 Mbps
802.11a5 GHz54 Mbps
4 more rows

Which security concerns exist for a WLAN? ›

Wireless network security issues and threats

spoofing and session hijacking - where the attacker gains access to network data and resources by assuming the identity of a valid user. eavesdropping - where unauthorised third parties intercept the data being transmitted over the secure network.

How do WLANs protect authentication and privacy? ›

WEP provides security to WLAN by encrypting the information transmitted over the air so that only the receivers with the correct encryption key can decrypt the information. WPA/WPA2 (WI-FI Protected Access): Improved on WEP by introducing Temporal Key Integrity Protocol (TKIP).

What are WLAN security settings? ›

All WLAN equipment comes with some form of encryption in the form of WEP, WPA, and WPA2 security protocols. The reason one should prefer WPA (Wi-Fi protected access) and WPA2 over WEP (Wired Equivalent Privacy) is that the former uses AES (Advanced Encryption Standard), which can provide better encryption.

What are the WLAN security authentication and encryption standards? ›

Only authorized parties with the correct decryption key can read the data, preventing unauthorized access. Common encryption standards for wireless networks include WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access), and WPA2, with WPA3 being the latest and most secure standard.

What is the least secure WLAN standard? ›

Using some encryption is always better than using none, but WEP is the least secure of these standards, and you should not use it if you can avoid it. WPA2 is the most secure of the three.

Which of the following is the most secure encryption method for Wlans? ›

The most secure method of wireless encryption is WPA2 (Wi-Fi Protected Access 2). WPA2 uses a stronger encryption algorithm than its predecessor, WPA (Wi-Fi Protected Access). It provides better security by using the Advanced Encryption Standard (AES) algorithm, which is difficult to crack.

What is the most secure option for Wi-Fi network? ›

WPA3 Personal is the newest, most secure protocol currently available for Wi-Fi devices. It works with all devices that support Wi-Fi 6 (802.11ax), and some older devices.

What are the two main approaches used to secure wireless networks? ›

Specifically, wireless security involves the following:
  • Conduct encryption: Converts data into a code that can be read only by authorized users with the appropriate key.
  • Authenticate users and devices: Processes validated identities of individuals and devices that attempt to connect to the network.
Apr 29, 2024

Which of the following is considered the most secure feature of your WLAN network? ›

Check your router's security protocol

Your router may use a range of potential wireless security protocols, but not all of them are considered safe. WPA3 (Wi-Fi Protected Access 3) or WPA2 are the best settings right now. WEP (Wired Equivalent Privacy) is now considered relatively easy to crack and should be avoided.

References

Top Articles
Instant Pot Beets Recipe (Step-By-Step Instructions & Photos)
Sponge Toffee Recipe
Funny Roblox Id Codes 2023
Golden Abyss - Chapter 5 - Lunar_Angel
Www.paystubportal.com/7-11 Login
Joi Databas
DPhil Research - List of thesis titles
Shs Games 1V1 Lol
Evil Dead Rise Showtimes Near Massena Movieplex
Steamy Afternoon With Handsome Fernando
Which aspects are important in sales |#1 Prospection
Detroit Lions 50 50
18443168434
Newgate Honda
Zürich Stadion Letzigrund detailed interactive seating plan with seat & row numbers | Sitzplan Saalplan with Sitzplatz & Reihen Nummerierung
Red Tomatoes Farmers Market Menu
Nalley Tartar Sauce
Chile Crunch Original
Immortal Ink Waxahachie
Craigslist Free Stuff Santa Cruz
Mflwer
Spergo Net Worth 2022
Costco Gas Foster City
Obsidian Guard's Cutlass
Marvon McCray Update: Did He Pass Away Or Is He Still Alive?
Mccain Agportal
Amih Stocktwits
Fort Mccoy Fire Map
Uta Kinesiology Advising
Kcwi Tv Schedule
What Time Does Walmart Auto Center Open
Nesb Routing Number
Olivia Maeday
Random Bibleizer
10 Best Places to Go and Things to Know for a Trip to the Hickory M...
Black Lion Backpack And Glider Voucher
Gopher Carts Pensacola Beach
Duke University Transcript Request
Lincoln Financial Field, section 110, row 4, home of Philadelphia Eagles, Temple Owls, page 1
Jambus - Definition, Beispiele, Merkmale, Wirkung
Ark Unlock All Skins Command
Craigslist Red Wing Mn
D3 Boards
Jail View Sumter
Nancy Pazelt Obituary
Birmingham City Schools Clever Login
Thotsbook Com
Funkin' on the Heights
Vci Classified Paducah
Www Pig11 Net
Ty Glass Sentenced
Latest Posts
Article information

Author: Lakeisha Bayer VM

Last Updated:

Views: 6832

Rating: 4.9 / 5 (49 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Lakeisha Bayer VM

Birthday: 1997-10-17

Address: Suite 835 34136 Adrian Mountains, Floydton, UT 81036

Phone: +3571527672278

Job: Manufacturing Agent

Hobby: Skimboarding, Photography, Roller skating, Knife making, Paintball, Embroidery, Gunsmithing

Introduction: My name is Lakeisha Bayer VM, I am a brainy, kind, enchanting, healthy, lovely, clean, witty person who loves writing and wants to share my knowledge and understanding with you.