The present invention relates to security for wireless communication, and in particular although not exclusively to wireless local area networks.
Wireless local area networks (WLAN) are becoming increasingly popular as a way of providing communication between terminals without the need for expensive and awkward cabling; and to enable more dynamic or flexible network layouts. For example increasing numbers of businesses are installing WLAN to couple their staff terminals to the firm's IT resources. However the use of this technology increases the risk of security breaches.
Wireless LANs suffer from security weaknesses as the radio signals used to transfer data and control signals can be intercepted by third parties. This weakness can be exploited by hackers to either eavesdrop on communications across the network or to actively disrupt the functioning of the network.
Though not always employed by operators of WLAN, solutions to this problem include encryption of the traffic data travelling on the radio signals together with authentication procedures for terminals coupled to the network. Such a system is described for example in European patent application number 1178644. Hackers are able to counter these measures to some extent which leads to more sophisticated encryption and/or authentication. However this makes these systems more complex and costly.
In general terms in a first aspect the present invention provides a wireless communication system having improved security. Preferably the system is in the form of a wireless local area network such as an IEEE 802.11 network having a number of terminals. The wireless terminals are arranged to communicate with each other using radio signals having a directed radiation pattern, preferably a narrow beam directed from the transmitting terminal to the receiving terminal. This considerably reduces the opportunities for a hacker to illegitimately interact with the wireless network by significantly reducing the coverage area of this network. Preferably the terminals are further arranged such that their transmission power is adjusted in order to reduce their transmission range to that required by the receiving terminal. Again, this further reduces the opportunity for a hacker to interface with the network by further reducing the coverage area, and in particular adapting the coverage area to the minimum required for communication between the two terminals.
This is a relatively simple measure which can be taken to improve the security of a wireless communication system, and can usefully be combined with more traditional encryption and authentication mechanisms.
In particular in one aspect the present invention provides a wireless local area network according to claim 1.
In particular, in another aspect the present invention provides a terminal according to claim 12.
In general terms in another aspect the present invention provides a method for improving the security of a wireless communication system and in particular a wireless local area network. The method comprises directing the transmission radiation patterns of the terminals according to the location of the other terminals within the network. Preferably the power of the transmission radiation is also controlled depending on the distances to the other terminals. In this way the network is arranged to have a minimum coverage area or radiation pattern in order to enable effective communication between the terminals. This reduces the opportunity for hackers to interact with the network. This is especially the case where the radiation patterns do not extend beyond a building owned or controlled by the entity operating the network.
In particular, in this other aspect the present invention provides a method for improving the security of a local area network according to claim 13.
The directed transmission radiation patterns are preferably in the form of narrow beams which may be generated in the terminals using known beam formers and antenna arrays. The radiation pattern of one or more of the terminals may further be adjusted to comprise a null or notch directed at a transmission source which is either not recognised by the network or is otherwise interfering with the network's performance.
The narrow beams are preferably limited in distance, by adjusting transmission power in the associated terminal, to that required to communicate with the other terminal. This transmission power adjustment may be implemented in the terminal using known power control mechanisms.
Embodiments are described with respect to the following drawings, by way of example only and without intending to be limiting, in which:
Referring to
It can be seen that the various wireless networks within the house extend well beyond its physical boundaries. A similar situation exists for business WLAN, in which a number of employee computer terminals are distributed about a business' building, however the footprint or wireless coverage area of this network typically will extend beyond the building walls in all directions. In these cases it is relatively easy for a hacker to try to access these networks from outside the building, for example in an adjacent building, on the footpath or on the street in a car for example.
Referring to
Power control is a very well known mechanism and typically involves a feedback loop from the receiver to the transmitter, where the receiver reports back whether the transmitter is too quiet. In the case of CDMA applications, transmission power is maintained as low as necessary so as not to drown out other nearby terminals. ETSI (http://www.etsi.org) standards such as GSM and UMTS/3G mandate power control and define the higher level message exchanges required to report back the received power levels and to request increases or decreases in transmit power.
In the embodiment, the received signal level is maintained between two predetermined levels in order to ensure acceptable communications but at the same time not to allow the signal strength to become excessive and thus the “beam” to significantly “overshoot” the receiving terminal.
A practical architecture for achieving this is shown in
When the terminal transmits information to another terminal, the receiving terminal's identifier is sent to the mapping device 21 which then instructs the beam forming and power control circuitry 12 to provide the appropriate transmission beam 10 from the antenna array 11. The mapping function 21 may simply comprise a table of terminal identifier and beam direction and power level which is used to control the beam forming and power control circuitry in a known manner. This function will typically be implemented at a higher level in the protocol stack for example an application or transport layer 22.
Alternatively, a look-up table, indexed by destination address, could be implemented in the MAC layer (layer 2, the link layer). The application/high layers send as instructions “send this packet to device X”. The MAC layer then looks through the table for device X's entry, and extracts information such as the direction in which device X lies (and/or the actual parameters that the physical layer would require to steer a beam that way) and a power level to just reach that device.
If the terminal has never transmitted to that device before, some initialisation is required. This could be user initiated with the user entering a relative location and distance. Alternatively, the terminal could do an omnidirectional transmission to handshake with the destination device first and authenticate it. Secure handshaking procedures are known and can be implemented here—for example that used if registering a new handset onto a DECT base station.
The information in the look-up table can be updated during operation, to reflect any relative movement by the two devices, as well as any changes in the radio propagation environment (e.g. interference, obstructions) which may require changes to the nominal power level.
Similarly the terminal will “know” which direction another terminal will transmit from and so can be arranged to only receive transmissions along predetermined paths, and not for example from a rogue terminal outside of these directions.
In addition to these measures, the terminal may also incorporate more traditional security measures such as authentication and encryption processes 23, again typically implemented at a higher layer 22.
Thus the embodiment can be implemented on a standard terminal using an antenna array, beamforming and power control circuitry and adaptation of the transport or application layer protocol 22, and for the MAC layer.
The terminal may also be arranged to direct a null in the antenna radiation pattern toward a transmission source. Such a source may be a third party source trying to “hack” into the wireless network, or alternatively may be a misbehaving or misperforming terminal causing performance difficulties for the network. In this case a null can be directed towards this terminal in order to minimise its effect on the network.
Any suitable WLAN network may be utilised, for example any of the IEEE 802.11™ family, ETSI's HiperLAN-2™, or Japan's HiSWANa™. Similarly, this security measure could also be implemented on a Personal Area Network (PAN) such as Blue Tooth™ for example.
Embodiments provide an improved method of increasing the security of a wireless network, in particular a WLAN or PAN, by appropriately limiting the wireless footprint of the network.
Alternative implementations involve mechanically adjusted/steerable antennas, and switching between fixed narrow beams to “line up” the receiving terminal.
The skilled person will recognise that the above-described apparatus and methods may be embodied as processor control code, for example on a carrier medium such as a disk, CD- or DVD-ROM, programmed memory such as read only memory (Firmware), or on a data carrier such as an optical or electrical signal carrier. For many applications embodiments of the invention will be implemented on a DSP (Digital Signal Processor), ASIC (Application Specific Integrated Circuit) or FPGA (Field Programmable Gate Array). Thus the code may comprise conventional programme code or microcode or, for example code for setting up or controlling an ASIC or FPGA. The code may also comprise code for dynamically configuring re-configurable apparatus such as re-programmable logic gate arrays. Similarly the code may comprise code for a hardware description language such as Verilog™ or VHDL (Very high speed integrated circuit Hardware Description Language). As the skilled person will appreciate, the code may be distributed between a plurality of coupled components in communication with one another. Where appropriate, the embodiments may also be implemented using code running on a field-(re)programmable analog array or similar device in order to configure analog hardware.
The skilled person will also appreciate that the various embodiments and specific features described with respect to them could be freely combined with the other embodiments or their specifically described features in general accordance with the above teaching. The skilled person will also recognise that various alterations and modifications can be made to specific examples described without departing from the scope of the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
0318430.6 | Aug 2003 | GB | national |