SP 800-153 Guidelines for Securing WLANs (2024)

Table of Contents
Background Summary Notes FAQs References

Status: Final Published

Date: February 2012

Region: United States

Document: Link

Background

The NIST SP 800-153 document was developed to provide security guidance for WLAN connections based on the IEEE 802.11 specification. This standard is meant to supplement, not override any other NIST documents, guidelines, and standards related to communication security. The SP 800-153 is considered one of the vital digital security documents aimed at providing the groundwork for a significant portion of IoT connections, including applications that relate to the smart city/automotive combination.

Summary

WLAN Network Architecture: WLAN connections are characterized by the wireless communication of networking devices within a certain geographic area (key applications include building automation or industrial settings). WLAN depends upon the following three components: 1) the gateways/routers that allow the connection, 2) the devices (CE) that connect to said routers, and 3) the Wireless Access Points (WAPs or simply APs), which are the hardware components required to allow connectivity, even if there is no router in range. Different security requirements are needed in order to protect the network and its components, and the document focuses on suggestions related to the networks themselves rather than the devices that connect to them.

Security Assessment and Monitoring: The NIST makes another important suggestion regarding WLAN security assessment and monitoring. These two terms describe the periodic or continuous processes that relate to an organization assessing and monitoring the security aspects, traffic, and behavior of their WLAN networking systems. A great deal of the suggestions relate to attacker tunneling from WLANs to wired connection for dual systems, which is not relevant for this security study.

Passive Threats: The SP 800153 states that attackers can passively eavesdrop on WLAN connections, gathering information about all involved parties, message content, and all related intelligence. Continuously monitoring car systems is a lot more challenging than enterprise settings. Monitoring for this threat is usually insufficient because the attackers are simply eavesdropping, not generating traffic. Therefore, implementers are advised to monitor car systems at predetermined time frames, or after any suspicious network shift. This can be achieved locally through the use of dedicated systems like Intrusion Detection and Prevention Systems (IDPS).

Active Threats: Fraudsters can also actively engage in DoS attacks, use replay attacks posing as legitimate users to request information from any connected system or online resource, and even modify any message sent. This case requires more sophisticated security tools. This includes systems that place a threshold over the number of requests (i.e., DoS prevention), make use of User and Entity Behavioral Analytics (UEBA) to effectively monitor traffic and abnormal user or system behavior, or even wireless IDPS sensors that can prevent rogue devices from spoofing the identity of another system. This is referred to as in-vehicle IDPS and can be used to detect anomalies in automotive ECUs.

Identify WLAN Security Requirements: As expected, all wireless connections are considered highly insecure when compared with their wired counterparts. Organizations should carefully plan out the security requirements for their target application, which may well extend into laws and regulations from governmental and regulatory bodies like the Department of Homeland Security or the Government Accountability Office (GAO). Each application has its own threat vectors and companies are expected to research these ahead of time in order to safely design the basic WLAN networking blueprint. For the task at hand, the following market segments are targeted: automotive, smart home, smart cities, and related applications like connected parking, in-car payments, etc.

Architecture Suggestions and Caveats: The NIST explicitly states that security architecture should not focus on the organization’s WLAN network, but also calculate how it will be affected by other networks that are accessible through it. Separating WLANs and addressing security concerns in a different manner should also be one of the top priorities (e.g., internal use versus external use, high-priority or critical sys- tems versus secondary functions, etc.). This measure is meant to address a serious security concern: network tunneling. Cyberattackers can essentially tunnel traffic and leap from one insecure, secondary sub-network (e.g., guests) to a higher-security one (e.g., corporate) based on architectural flaws that exist in the relationship between these two networks. This also applies to “dual” connections and devices that can connect to multiple wireless interfaces. This may include, for example, a laptop that is both wirelessly and Ethernet connected, or a smartphone device that connects both to public or other networks and an automotive system at the same time. Suggestions to address the above include:

  • Configuring the system to deny other network interfaces (or at least permit only some)
  • Deploy OTA updates or specialized software that allows connection in either WLAN or wired
    access, but not both simultaneously
  • Enforce host-based tools (gateway firewalls and intrusion detection/prevention systems) to
    prevent any external networks to access car systems
  • Account for the fact that CE or poorly coded third-party car infotainment apps may sometimes cause an override in the above measures

Notes

Note that some of the aforementioned insights follow the same pattern covered in the NIST’s SP 800-187 Guide to LTE Security. Many of the attacks are also quite similar, but relate to WAPs instead of cellular communications. They also follow similar analysis covered in the UNECE Recommendation on Software Update Processes. Taken together, all three aforementioned documents give a more complete picture regarding the three key threat vectors for securing communication in the connected car:

a) securing cellular connectivity and maintain data integrity and confidentiality, b) protecting OTA security updates and standardizing the manner in which said updates are addressed, deployed, maintained, and monitored, and c) addressing security for wireless access communication, which has a direct effect on all incoming-outgoing communication with certain smart city applications—also considered a vital aspect for the future evolution of the connected vehicle.

Published: August 19th, 2020

SP 800-153 Guidelines for Securing WLANs (2024)

FAQs

SP 800-153 Guidelines for Securing WLANs? ›

WEP, WPA, WPA2, and the latest WPA3 are the four types of wireless network security protocols, each with increasing levels of security. While WPA2, which uses AES encryption, is commonly used, WPA3 provides additional security features such as stronger encryption and attack defense.

What are the wireless security standards applied in WLANs? ›

WEP, WPA, WPA2, and the latest WPA3 are the four types of wireless network security protocols, each with increasing levels of security. While WPA2, which uses AES encryption, is commonly used, WPA3 provides additional security features such as stronger encryption and attack defense.

Which of the following standard provides security to WLAN? ›

IEEE 802.11i is an IEEE 802.11 amendment used to facilitate secure end-to-end communication for wireless local area networks (WLAN).

Which encryption method is best for WLAN? ›

As the most up-to-date wireless encryption protocol, WPA3 is the most secure choice. Some wireless APs do not support WPA3, however. In that case, the next best option is WPA2, which is widely deployed in the enterprise space today.

What is NIST 800 153? ›

SP 800-153, Guidelines for Securing Wireless Local Area Networks (WLANs) | CSRC.

What are the 4 standards of WLAN? ›

The prominent among them are 802.11, 802.11a, 802.11b, 802.11g, 802.11n and 802.11p. All the standards use carrier-sense multiple access with collision avoidance (CSMA/CA). Also, they have support for both centralised base station based as well as ad hoc networks.

How do WLANs protect authentication and privacy? ›

WEP provides security to WLAN by encrypting the information transmitted over the air so that only the receivers with the correct encryption key can decrypt the information. WPA/WPA2 (WI-FI Protected Access): Improved on WEP by introducing Temporal Key Integrity Protocol (TKIP).

Which security concerns exist for a WLAN? ›

Wireless network security issues and threats

spoofing and session hijacking - where the attacker gains access to network data and resources by assuming the identity of a valid user. eavesdropping - where unauthorised third parties intercept the data being transmitted over the secure network.

What are WLAN security settings? ›

All WLAN equipment comes with some form of encryption in the form of WEP, WPA, and WPA2 security protocols. The reason one should prefer WPA (Wi-Fi protected access) and WPA2 over WEP (Wired Equivalent Privacy) is that the former uses AES (Advanced Encryption Standard), which can provide better encryption.

What are the WLAN security authentication and encryption standards? ›

Only authorized parties with the correct decryption key can read the data, preventing unauthorized access. Common encryption standards for wireless networks include WEP (Wired Equivalent Privacy), WPA (Wi-Fi Protected Access), and WPA2, with WPA3 being the latest and most secure standard.

What is the least secure WLAN standard? ›

Using some encryption is always better than using none, but WEP is the least secure of these standards, and you should not use it if you can avoid it. WPA2 is the most secure of the three.

Which of the following is the most secure encryption method for Wlans? ›

The most secure method of wireless encryption is WPA2 (Wi-Fi Protected Access 2). WPA2 uses a stronger encryption algorithm than its predecessor, WPA (Wi-Fi Protected Access). It provides better security by using the Advanced Encryption Standard (AES) algorithm, which is difficult to crack.

What is the most secure option for WiFi network? ›

WPA3 Personal is the newest, most secure protocol currently available for Wi-Fi devices. It works with all devices that support Wi-Fi 6 (802.11ax), and some older devices.

What are the two main approaches used to secure wireless networks? ›

The Three Primary Ways that Most People Protect their Network: Leaving the WiFi access open, but requiring a VPN connection to access anything important. Protecting the WiFi network with a single password or passphrase.

Which of the following is considered the most secure feature of your WLAN network? ›

Check your router's security protocol

Your router may use a range of potential wireless security protocols, but not all of them are considered safe. WPA3 (Wi-Fi Protected Access 3) or WPA2 are the best settings right now. WEP (Wired Equivalent Privacy) is now considered relatively easy to crack and should be avoided.

References

Top Articles
Att Internet Outage Dacula Ga
Terraria Chair
12 Rue Gotlib 21St Arrondissem*nt
Get train & bus departures - Android
Shorthand: The Write Way to Speed Up Communication
Activities and Experiments to Explore Photosynthesis in the Classroom - Project Learning Tree
Top 10: Die besten italienischen Restaurants in Wien - Falstaff
Obituary (Binghamton Press & Sun-Bulletin): Tully Area Historical Society
Owatc Canvas
What's Wrong with the Chevrolet Tahoe?
About Goodwill – Goodwill NY/NJ
Dityship
Pvschools Infinite Campus
Enderal:Ausrüstung – Sureai
Mini Handy 2024: Die besten Mini Smartphones | Purdroid.de
Sam's Club La Habra Gas Prices
Kiddle Encyclopedia
Craigslist West Valley
Bing Chilling Words Romanized
north jersey garage & moving sales - craigslist
The Ultimate Guide to Extras Casting: Everything You Need to Know - MyCastingFile
Like Some Annoyed Drivers Wsj Crossword
Jermiyah Pryear
Mals Crazy Crab
Pawn Shop Moline Il
Finding Safety Data Sheets
1773x / >
Evil Dead Rise Showtimes Near Sierra Vista Cinemas 16
Marlene2995 Pagina Azul
Turns As A Jetliner Crossword Clue
Courtney Roberson Rob Dyrdek
Ridge Culver Wegmans Pharmacy
What Happened To Father Anthony Mary Ewtn
Luciipurrrr_
All Things Algebra Unit 3 Homework 2 Answer Key
Santa Cruz California Craigslist
Magicseaweed Capitola
7543460065
159R Bus Schedule Pdf
Craigs List Palm Springs
Xxn Abbreviation List 2023
10 Rarest and Most Valuable Milk Glass Pieces: Value Guide
FREE - Divitarot.com - Tarot Denis Lapierre - Free divinatory tarot - Your divinatory tarot - Your future according to the cards! - Official website of Denis Lapierre - LIVE TAROT - Online Free Tarot cards reading - TAROT - Your free online latin tarot re
Swoop Amazon S3
Studentvue Calexico
Arch Aplin Iii Felony
Random Animal Hybrid Generator Wheel
Paperlessemployee/Dollartree
Jimmy John's Near Me Open
Grand Park Baseball Tournaments
2000 Fortnite Symbols
Houston Primary Care Byron Ga
Latest Posts
Article information

Author: Rubie Ullrich

Last Updated:

Views: 6366

Rating: 4.1 / 5 (72 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Rubie Ullrich

Birthday: 1998-02-02

Address: 743 Stoltenberg Center, Genovevaville, NJ 59925-3119

Phone: +2202978377583

Job: Administration Engineer

Hobby: Surfing, Sailing, Listening to music, Web surfing, Kitesurfing, Geocaching, Backpacking

Introduction: My name is Rubie Ullrich, I am a enthusiastic, perfect, tender, vivacious, talented, famous, delightful person who loves writing and wants to share my knowledge and understanding with you.