Not your neighbour's WiFi

September 2013 Infrastructure

When looking at surveillance cameras being sold in a retail store, one may be persuaded that your home wireless connection (WiFi) is a perfectly acceptable networking solution for CCTV. In the average home environment it may very well be, you have a limited number of cameras that are unlikely to be monitored at all times and image quality is not critical.

However, many businesses (and, sad to say, some installers) seem to consider WiFi an acceptable option for ‘professional’ surveillance. In limited doses WiFi can be the answer, but for professional, multi-camera installations it generally doesn’t make the grade in terms of quality of service, bandwidth and security.

Of course, WiFi is not the only wireless option available and many companies and cities make use of wireless communications for surveillance solutions in harsh conditions and over distances of many kilo-metres. But don’t take our word for it. Hi-Tech Security Solutions asked two wireless experts for their take on the suitability of wireless networks for communications.

A viable option?

We first asked whether wireless networking was a realistic option for security projects in general, such as surveillance, building management, access control, etc. Andy Robb, chief technology officer for Duxbury Networking, says: “Wireless networking is not only a realistic option, but in many organisations it is a vital option as the alternative (cabling) is a far less secure data transport medium.”

He adds that cabling can easily be physically tampered with (a simple device attached to an Ethernet cable can pick up everything that’s being transmitted), while wireless networks regularly incorporate scrambled or encrypted data traffic which cannot be easily deciphered by those with malicious intent. “Likewise, wireless network routers and wireless access points regularly incorporate access control features (such as MAC address filtering) that deny requests from unwanted clients.”

Bertus van Jaarsveld, CEO of Miro distribution agrees, saying the wireless industry has developed to a point where the latest products enable wireless solutions that are as secure as wired infrastructure and in many cases faster than wired solutions. “What is a more realistic solution, digging up existing infrastructure to install cables or to install a wireless solution? Which is faster and cheaper?”

Van Jaarsveld adds that all three areas mentioned, surveillance, building management and access control tend to have one or two outlying points that create a headache for cable installations. “The entire system does not have to be wireless, but it can easily be added to a wired system to connect one or more distant or difficult to reach points.”

Securing your network

Everyone has heard of the dangers of wireless and how easy (supposedly) it is to hack into these systems, but what are the real issues users face?

Robb says many threats abound, particularly targeted at networks that enforce security. “These networks are central to the overall functioning of the corporation, so having secure network connections is of the utmost importance.”

He adds that common threats include data interception and theft, but those aimed at network-linked surveillance systems (for example) often include denial of service attacks which could render any poorly protected security network inoperable in seconds.

“Fortunately, today’s wireless technologies have a number of security parameters and protocols embedded ready for configuration. Unfortunately, a lack of appreciation of the seriousness of the threats often results in installers taking short cuts on implementation by ignoring them.”

Van Jaarsveld adds that any wireless network should be secured, unless your aim is to provide free public access. “The threat to wireless networks is no different to the threat to wired networks, as long as the proper security measures have been deployed. What is easier – breaking a wireless encryption protocol or cutting a cable?”

Layered security

The first step towards ensuring network security is to gain a thorough understanding of the processes involved, Robb explains. “An effective security implementation will consist of many layers of protection. Like the layers of an onion, they will reinforce one another to form a buttress against intrusions. Typically, the layers include data encryption, password protection, user profile analysis, and even seemingly innocuous precautions such as time-of-day schedule compatibility, designed to highlight log-on incongruities.

“Each security layer will support another, reinforcing control and rendering the complete system more effective by many orders of magnitude.”

Van Jaarsveld admits there are wireless security protocols that can be cracked. “This is clearly documented and installers know not to rely on WEP encryption to protect systems.

“There are much better wireless encryption systems and algorithms that have been developed that are secure against hackers. WPA2 encryption is secure, especially when deployed in conjunction with a radius server – it has not been compromised yet. If you have really sensitive details or are paranoid, deploy a VPN or SSH tunnel, we trust our banking over the Internet on this technology.”

Our final question to the two experts was if it is safe to integrate wireless security networks into your business communications infrastructure?

“It certainly is safe and even advisable to integrate wireless security into an overarching communications infrastructure,” says Robb. “However, it is prudent to follow accepted, time-proven principles and – with the onion-layer approach in mind – have a best practice guide on hand for assistance.

“Ensure that a policy-based, step-by-step approach is adopted towards all aspects of the integration process and be diligent in terms of its execution. If in doubt, consult with an experienced industry specialist.”

The challenge is not so much to integrate wireless security networks, but rather the challenge of integrating security networks onto your business network, says Van Jaarsveld.

“The main challenge is purely the huge volume of data that is created by IP video systems which can easily overwhelm your business network or lead to reduced performance on business systems. Network planning is very important to provide capacity, route traffic streams to different areas and provide quality of service (for example to protect VoIP performance) etc.

Wireless networks are then definitely suitable for security, including surveillance projects. The trick is correct planning, using the correct technology and configuring the systems to enable the level of security required. This means it’s not something your cousin who “knows computers” should do, but should be handled by experienced technicians who understand the technology as well as the security and business communications requirement of the company.

The growth of wireless continues

Hi-Tech Security Solutions also spoke to Neil Cameron, GM: Systems & Service Africa at Johnson Controls about the growth in demand for wireless products. Cameron says the popularity of wireless security solutions started in the intrusion industry where easier installations and maintenance made these products more popular. Over the last few years, the influence of wireless has expanded to other areas of security, including the surveillance market.

There are many benefits to wireless surveillance solutions, such as no trenching for cables and the ability to keep an eye on remote areas such as perimeter fences etc. However, Cameron warns that wireless is not the ultimate solution as wireless signals can be blocked, meaning mission-critical surveillance operations may prefer cabled solutions. And although the latest wireless solutions offer increased bandwidth and speed, bandwidth is a critical measurement to take into account in the design and planning phase.

When looking at what wireless products are selling well today for Johnson Controls, Cameron says that access control offerings have taken off recently. A few years ago, wireless access control systems were not well accepted, but today with smaller, more aesthetically pleasing offerings, they are becoming more popular. They offer the same functionality as wired solutions, but are easier and faster to install.

From a security perspective, they run on a dedicated network and exchange encrypted signals that only the locks can receive and send. This ensures security as only the access devices can communicate with each other.

And while there are still more wired than wireless products being sold, Cameron believes that in four or five years, wireless products will rule the roost, offering better performance at a lower cost than their wired counterparts.

Contact information

Miro distribution: +27 (0)12 657 0960, www.miro.co.za

Duxbury Networking: +27 (0)11 351 9800, www.duxbury.co.za



Credit(s)






Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of the surveillance channel
Duxbury Networking Technews Publishing Elvey Security Technologies SMART Security Solutions Surveillance
The video surveillance market has evolved from camera-based specifications to integrated solutions that solve customers’ problems. Moreover, the growth of AI and cloud has changed the channel even more, with more to come.

Read more...
AI means proactive surveillance
DeepAlert Technews Publishing SMART Security Solutions AI & Data Analytics Surveillance
SMART Security Solutionsasked DeepAlert for some insight into how AI is transforming video surveillance, even to the extent of it being taught to protect the privacy of those in the cameras’ view.

Read more...
Integration is the key to smarter surveillance
Duxbury Networking Surveillance
According to recent market projections, the local security industry is expected to grow by more than 10% annually through 2029, reflecting the increasing demand for smarter, more proactive security solutions.

Read more...
Are we over the edge?
SMART Security Solutions Axis Communications SA Hikvision South Africa IoT & Automation
SMART Security Solutions speaks to Axis Communications and Hikvision to learn what is happening on the edge of surveillance solutions. Is everything now in the cloud, or are edge devices still in demand?

Read more...
A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Benchmark in long-range surveillance
Duxbury Networking Surveillance Products & Solutions
Duxbury Networking says the long-range, high-resolution monitoring AXIS Q1809-LE bullet camera has been enhanced further with integration into Milestone XProtect to set a new standard for forensic-level image clarity, intelligent event detection, and enhanced security management.

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...