Separate security hype from reality

September 2013 Surveillance, Perimeter Security, Alarms & Intruder Detection, Infrastructure

Peter Turvey
Peter Turvey

Wireless networks have been labelled as generally insecure, supported by all sorts of horror stories on the Internet and even mainstream press. Hi-Tech Security Solutions spoke to Peter Turvey and Nick Ehrke from Radwin SA to find out how insecure wireless really is.

Turvey is quick to point out that we generally lump all wireless communications in the same basket as public WiFi access. This is a mistake as the WiFi you access at a coffee shop or the airport is designed to be widely available to as many people as possible. These networks are designed for easy access, making them somewhat insecure by design.

When looking at wireless networks used for transmitting business data and, specifically to the security industry, video surveillance, Turvey explains that these systems are not WiFi and run on different protocols and frequencies.

“Radwin’s technology was designed for use in the Israeli military,” explains Turvey. “It needed to be secure, have a longer range than WiFi and be reliable enough to use in situations where loss of communications or hacking could lead to a loss of life. These systems are built to reliably support high throughput in harsh conditions.”

This need for secure communications led to the security settings being hardware encoded to ensure they can’t be changed. For example, Turvey says that when setting up a (non-WiFi) wireless connection, you don’t broadcast the network’s existence and ask people to log on. In Radwin’s case, the systems can be set up so that only a specific Radwin device will speak to another specific Radwin device based on each one’s Mac addresses. The communication is also encrypted.

This means that even if someone does find the network, the device will reject any communications from non-specified devices. Using the Mac address means that even if a hacker is using a Radwin device, if it does not have the specified Mac address (or addresses), it will be excluded from the network until an administrator physically adds the new address.

This is even more secure than cabled networks. If you plug a laptop into an Ethernet port at a company, you almost always automatically have access to the first layer of the network as the end point synchronises automatically. For most people this means nothing, but for a hacker with time and skills it’s a starting point. You can’t even get that far on secure wireless networks.

Radwin’s southern African sales director, Nick Ehrke says that the wireless option is finding more acceptance in areas where traditional cabling is impossible, unsightly or even inconvenient. An example is in residential estates where digging up the streets is unpopular. It also avoids problems of cutting cables, either by accident or intentionally, while permitting high throughput for high definition and megapixel cameras.

The benefits of wireless are self evident. Ehrke notes that the wireless cameras on some of Cape Town’s highways have reduced the average response time to accidents from around 20 minutes to about two. Safe City projects are also looking to wireless surveillance links because some city leaders understand that if they can provide a safe environment they will attract businesses and consumers, who will contribute to the city’s tax coffers. Additionally, wireless systems are quicker to deploy without digging up the streets.

Of course, in some smaller companies or private residences, WiFi might be the better choice when networking cameras. However, in these scenarios there are generally a limited number of cameras and constant HD viewing is not a necessity. Even in this scenario, setting up the network securely will make it more difficult for people to find it and hack into it.

The convenience of wireless networking is a given, and with the correct technology and configuration, users can be assured of the security of their data and the cost effectiveness of not having to lay cables. Wireless may not be the solution for every need, but effective planning and research will show that the right wireless solution is often exactly the solution companies require.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of the surveillance channel
Duxbury Networking Technews Publishing Elvey Security Technologies SMART Security Solutions Surveillance
The video surveillance market has evolved from camera-based specifications to integrated solutions that solve customers’ problems. Moreover, the growth of AI and cloud has changed the channel even more, with more to come.

Read more...
The benefits of offsite control rooms
Astrosec Surveillance Integrated Solutions
As the security landscape grows more intricate, control rooms – the crucial hub of security operations – need to adapt. With escalating costs, mounting threats, and a heightened demand for immediate responses, many organisations are reassessing the operations of their control rooms.

Read more...
CCTV control room operator job description
Leaderware Editor's Choice Surveillance Training & Education
Control room operators are still critical components of security operations and will remain so for the foreseeable future, despite the advances of AI, which serves as a vital enhancement to the human operator.

Read more...
Hikvision launches latest range of cameras
Hikvision South Africa Surveillance AI & Data Analytics
Hikvision has launched its latest network cameras with ColorVu 3.0 technology and EasyIP 4.0 Plus, which elevate video security by delivering improved image quality, enhanced intelligent functions, superior audio capabilities, and a refined product design and materials.

Read more...
Platform to access data and train AI models
Milestone Systems AI & Data Analytics Surveillance
Milestone Systems has announced Project Hafnia to build services and democratise AI-model training with high-quality, compliant video data leveraging NVIDIA Cosmos Curator and AI model, fine-tuning microservices.

Read more...
The capabilities of visual verification
Secutel Technologies Surveillance AI & Data Analytics
Secutel Technologies has provided locally developed visual verification solutions for some time. SMART Security Solutions requested more insight into these solutions from the company.

Read more...
AI means proactive surveillance
DeepAlert Technews Publishing SMART Security Solutions AI & Data Analytics Surveillance
SMART Security Solutionsasked DeepAlert for some insight into how AI is transforming video surveillance, even to the extent of it being taught to protect the privacy of those in the cameras’ view.

Read more...
Integration is the key to smarter surveillance
Duxbury Networking Surveillance
According to recent market projections, the local security industry is expected to grow by more than 10% annually through 2029, reflecting the increasing demand for smarter, more proactive security solutions.

Read more...
edgE:Tower video analytics integrated with SEON
Surveillance Integrated Solutions AI & Data Analytics
Sentronics has announced a new integration between its edgE:Tower advanced AI-driven video analytics solution and SEON, a Central Monitoring Software (CMS) platform. This integration enhances real-time situational awareness and automated threat detection for control rooms.

Read more...
The state of the VMS market
Arteco Global Africa Milestone Systems Cathexis Technologies Technews Publishing Surveillance
SMART Security Solutions asked three platform vendors in South Africa, one that is developed and maintained in the country with an international market, for their views on the state of the VMS market and where it is headed.

Read more...