Not your neighbour's WiFi

September 2013 Infrastructure

When looking at surveillance cameras being sold in a retail store, one may be persuaded that your home wireless connection (WiFi) is a perfectly acceptable networking solution for CCTV. In the average home environment it may very well be, you have a limited number of cameras that are unlikely to be monitored at all times and image quality is not critical.

However, many businesses (and, sad to say, some installers) seem to consider WiFi an acceptable option for ‘professional’ surveillance. In limited doses WiFi can be the answer, but for professional, multi-camera installations it generally doesn’t make the grade in terms of quality of service, bandwidth and security.

Of course, WiFi is not the only wireless option available and many companies and cities make use of wireless communications for surveillance solutions in harsh conditions and over distances of many kilo-metres. But don’t take our word for it. Hi-Tech Security Solutions asked two wireless experts for their take on the suitability of wireless networks for communications.

A viable option?

We first asked whether wireless networking was a realistic option for security projects in general, such as surveillance, building management, access control, etc. Andy Robb, chief technology officer for Duxbury Networking, says: “Wireless networking is not only a realistic option, but in many organisations it is a vital option as the alternative (cabling) is a far less secure data transport medium.”

He adds that cabling can easily be physically tampered with (a simple device attached to an Ethernet cable can pick up everything that’s being transmitted), while wireless networks regularly incorporate scrambled or encrypted data traffic which cannot be easily deciphered by those with malicious intent. “Likewise, wireless network routers and wireless access points regularly incorporate access control features (such as MAC address filtering) that deny requests from unwanted clients.”

Bertus van Jaarsveld, CEO of Miro distribution agrees, saying the wireless industry has developed to a point where the latest products enable wireless solutions that are as secure as wired infrastructure and in many cases faster than wired solutions. “What is a more realistic solution, digging up existing infrastructure to install cables or to install a wireless solution? Which is faster and cheaper?”

Van Jaarsveld adds that all three areas mentioned, surveillance, building management and access control tend to have one or two outlying points that create a headache for cable installations. “The entire system does not have to be wireless, but it can easily be added to a wired system to connect one or more distant or difficult to reach points.”

Securing your network

Everyone has heard of the dangers of wireless and how easy (supposedly) it is to hack into these systems, but what are the real issues users face?

Robb says many threats abound, particularly targeted at networks that enforce security. “These networks are central to the overall functioning of the corporation, so having secure network connections is of the utmost importance.”

He adds that common threats include data interception and theft, but those aimed at network-linked surveillance systems (for example) often include denial of service attacks which could render any poorly protected security network inoperable in seconds.

“Fortunately, today’s wireless technologies have a number of security parameters and protocols embedded ready for configuration. Unfortunately, a lack of appreciation of the seriousness of the threats often results in installers taking short cuts on implementation by ignoring them.”

Van Jaarsveld adds that any wireless network should be secured, unless your aim is to provide free public access. “The threat to wireless networks is no different to the threat to wired networks, as long as the proper security measures have been deployed. What is easier – breaking a wireless encryption protocol or cutting a cable?”

Layered security

The first step towards ensuring network security is to gain a thorough understanding of the processes involved, Robb explains. “An effective security implementation will consist of many layers of protection. Like the layers of an onion, they will reinforce one another to form a buttress against intrusions. Typically, the layers include data encryption, password protection, user profile analysis, and even seemingly innocuous precautions such as time-of-day schedule compatibility, designed to highlight log-on incongruities.

“Each security layer will support another, reinforcing control and rendering the complete system more effective by many orders of magnitude.”

Van Jaarsveld admits there are wireless security protocols that can be cracked. “This is clearly documented and installers know not to rely on WEP encryption to protect systems.

“There are much better wireless encryption systems and algorithms that have been developed that are secure against hackers. WPA2 encryption is secure, especially when deployed in conjunction with a radius server – it has not been compromised yet. If you have really sensitive details or are paranoid, deploy a VPN or SSH tunnel, we trust our banking over the Internet on this technology.”

Our final question to the two experts was if it is safe to integrate wireless security networks into your business communications infrastructure?

“It certainly is safe and even advisable to integrate wireless security into an overarching communications infrastructure,” says Robb. “However, it is prudent to follow accepted, time-proven principles and – with the onion-layer approach in mind – have a best practice guide on hand for assistance.

“Ensure that a policy-based, step-by-step approach is adopted towards all aspects of the integration process and be diligent in terms of its execution. If in doubt, consult with an experienced industry specialist.”

The challenge is not so much to integrate wireless security networks, but rather the challenge of integrating security networks onto your business network, says Van Jaarsveld.

“The main challenge is purely the huge volume of data that is created by IP video systems which can easily overwhelm your business network or lead to reduced performance on business systems. Network planning is very important to provide capacity, route traffic streams to different areas and provide quality of service (for example to protect VoIP performance) etc.

Wireless networks are then definitely suitable for security, including surveillance projects. The trick is correct planning, using the correct technology and configuring the systems to enable the level of security required. This means it’s not something your cousin who “knows computers” should do, but should be handled by experienced technicians who understand the technology as well as the security and business communications requirement of the company.

The growth of wireless continues

Hi-Tech Security Solutions also spoke to Neil Cameron, GM: Systems & Service Africa at Johnson Controls about the growth in demand for wireless products. Cameron says the popularity of wireless security solutions started in the intrusion industry where easier installations and maintenance made these products more popular. Over the last few years, the influence of wireless has expanded to other areas of security, including the surveillance market.

There are many benefits to wireless surveillance solutions, such as no trenching for cables and the ability to keep an eye on remote areas such as perimeter fences etc. However, Cameron warns that wireless is not the ultimate solution as wireless signals can be blocked, meaning mission-critical surveillance operations may prefer cabled solutions. And although the latest wireless solutions offer increased bandwidth and speed, bandwidth is a critical measurement to take into account in the design and planning phase.

When looking at what wireless products are selling well today for Johnson Controls, Cameron says that access control offerings have taken off recently. A few years ago, wireless access control systems were not well accepted, but today with smaller, more aesthetically pleasing offerings, they are becoming more popular. They offer the same functionality as wired solutions, but are easier and faster to install.

From a security perspective, they run on a dedicated network and exchange encrypted signals that only the locks can receive and send. This ensures security as only the access devices can communicate with each other.

And while there are still more wired than wireless products being sold, Cameron believes that in four or five years, wireless products will rule the roost, offering better performance at a lower cost than their wired counterparts.

Contact information

Miro distribution: +27 (0)12 657 0960, www.miro.co.za

Duxbury Networking: +27 (0)11 351 9800, www.duxbury.co.za



Credit(s)






Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Effective fire and smoke detection using cameras
Hikvision South Africa XtraVision SMART Security Solutions Technews Publishing Dahua Technology South Africa Fire & Safety
Video analytics, spurred on by advances in image processing, enhanced fire and smoke detection capabilities while significantly reducing false alarms in surveillance cameras. Today, AI has further improved accuracy and minimised false alarms.

Read more...
SMARTpod talks to The Risk Management Forum
SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Videos Training & Education
SMART Security Solutions recently released its first SMARTpod podcast, discussing the upcoming Risk Management Forum Conference 2024, which will be held on 26 September 2024 at the Indaba Conference Centre in Fourways, Johannesburg.

Read more...
Western Digital reveals new solutions
Products & Solutions News & Events Infrastructure
Western Digital unveiled new solutions and technology demonstrations at the Future of Memory and Storage Conference 2024. The innovations cater to diverse market segments, from hyperscale cloud to automotive and consumer storage.

Read more...
Supercharge surveillance with AXIS Camera Station Pro
Duxbury Networking Surveillance Products & Solutions
Designed to put efficient surveillance at users’ fingertips with an intuitive interface that is easy to operate, AXIS Camera Station Pro 6.2 provides a customisable video management and access control solution for companies of all sizes.

Read more...
The Duxbury Services Gateway revolutionises the Edge
Products & Solutions Infrastructure
Duxbury Networking has announced the launch of the Duxbury Services Gateway (DSG) range. These cost-effective edge compute appliances are designed to meet the diverse needs of South African businesses including SD-WAN, Firewall, and IP PBX applications.

Read more...
SMART Surveillance at the Indaba
SMART Security Solutions Editor's Choice Surveillance Videos
SMART Security Solutions hosted its second SMART Surveillance conference, focusing on a range of topics related to the video surveillance market, on July 11th, 2024, at the Indaba Conference Centre in Fourways.

Read more...
Navigating the evolving tech landscape in 2024 and beyond
Residential Estate (Industry) Infrastructure
Progress in the fields of AI, VR and social media is to be expected, but what is not, is our fundamental relationship with how we deploy solutions in our business and how it integrates with greater organisational strategies and goals.

Read more...
Eight terabyte desktop SSD
Products & Solutions Infrastructure
Western Digital has expanded its SanDisk portfolio with the new 8 TB SanDisk Desk Drive, its highest capacity yet on an external desktop solid state drive (SSD), also available with 4 TB

Read more...
78% of organisations highly concerned about cloud security
Information Security Infrastructure
As organisations develop and deploy more cloud applications, security becomes more complicated. Many organisations are adopting a hybrid or multi-cloud approach, which has expanded the attack surface and increased complexity.

Read more...
Share large files securely and without delay
Infrastructure Products & Solutions
Professional teams don't have to wait for large file uploads, dabble with insecure sharing platforms, or spend money on file servers and network storage. StorVault FileSpace is a South African solution providing fast, affordable, and secure file streaming.

Read more...