Home / 🌐Internet / 📡 Networks / Wireless Network Security: What types of protocols and mechanisms are there for a secure Wi-Fi connection?

Rate this post

It is very common, especially in big cities, that people living near the location of our router can access the WiFi network without the corresponding authorization. This brings a number of drawbacks to our Internet browsing , as it affects, among other things, the connection speed.

There are different alternatives that we can use to improve the security in the access to the wireless network that we can configure from the control panel of the router.

In this article we will indicate each of these options you have for an efficient configuration of the router, as well as show you the advantages of being able to use them. In addition, we’ll give you the best tips for making your WiFi network a fortress .

Index:

Why should I improve the security of my WiFi wireless networks?

Por qué debería mejorar la seguridad de mis redes inalámbricas WiFi

There are different reasons why we have to improve the security of our wireless networks, many of them are due to the security of our privacy, but they also considerably affect the performance of our connection .

To clarify this issue a little further, we will mention below what these reasons are.

With respect to privacy . This is an issue that many people don’t take into account, but when someone hacks a WiFi signal, this intruder has access to all the devices that make up the wireless network, and can change settings and extract data that puts our privacy and personal security at serious risk .

Another point to keep in mind with security is that, when you enter the wireless network you get the public IP address given to us by the Internet operator. If an intruder performs illegal acts on the website, they will be registered with our public IP , therefore, we may have serious problems.

Another point to consider is the connection speed . As we will see later, when third parties enter our network in an unauthorised manner, they greatly affect the speed, as we have to divide the bandwidth up into more devices.

In addition, if that intruder configures our router to activate the “QoS” tool you will be able to segment the journey of video and VoIP data packets.

This will indicate to the router that your computer has priority over the rest, so we would be seriously affected in terms of navigation because, our own router is performing that quality of service according to the indications given by the hacker.

Recommended for you:
What are the dangers behind the use of social networks? Handbook of good behavior in RRSS
 

How much can a person “stealing” WiFi from me affect my Internet speed?

Cuánto puede afectar a la velocidad de mi Internet que una persona me "robe" WiFi

The routers work with two frequencies, one of 2.4 GHz which has a range of up to 100 meters and has 13 channels , in which different data packets travel between the devices and the router.

The other, higher frequency, is 5 GHz , which is much more efficient as it has 22 channels and a much better bandwidth, but its range is much less than the previous one.

These channels are like highways on which data transit, if they take place these information packages will travel slower. Therefore, the more members there are of a network the slower the connection will be since the wide side will have to be divided in all those devices.

List of the main tools to secure your WiFi connection and prevent someone from connecting to your network

Our router device has tools that we can activate or modify to make our WiFi network security much more robust.

To do this, we’ll name these settings that we can make:

Filtering by MAC address

When the computer equipment is manufactured, each supplier inserts a unique identification number into the network cards that is composed of 48 bits . These numbers are not repeated in any way, no matter how computers and mobile devices are compared.

Therefore, this is a good option to identify the participants of a network and to be able to eliminate them, indicating to our router which are those authorized according to their MAC address.

The steps that we will have to make in a Tp-Link router are indicated next:

  • We enter with our browser to the router interface, for this we will write in the URL address bar “192.168.1.1” (if you don’t know this number we will explain it in the last paragraph of this section, as well as the MAC address).
  • We go to “Wireless” .
  • We look for the option “Access Point” .
  • Select “MAC filters” .
  • We activated the MAC filtering option.
  • We add one by one the devices with their different addresses.
  • Click on ” Apply” .
  • Select “Accept” .

When we do not know the IP or MAC address to enter the router we can perform this guide:

  • We go to “Start” in Windows.
  • We write “cmd” (a more direct alternative is to press together “Windows + R” ).
  • At this point a window will open in DOS.
  • We write the command “ipconfig” .
  • A series of data will appear and we will have to copy the data from “Default Gateway” .

Ejecting connected devices

cybersecurity

We have an important alternative offered by the router and that is to identify the different computers that are connected at the time of the analysis . In this way we can find out how many intruders are unduly in our network.

The directions we have to follow are:

  • Once entered in the router we go to “Wireless” .
  • We look for the option “Wireless Statistics” .
  • A list of the devices will appear and next to it an option for “Deny” , we click on it and the device is immediately ejected.
Recommended for you:
How do I know who is and isn't following me on Facebook quickly and easily? Step by step guide
 

Password protocol

An important alternative is to strengthen the password encryption protocol and convert it to WPA2.

We will perform these steps:

  • We go to “Wireless” .
  • We look for the option “Wireless Security” and click on it.
  • We activate the first alternative, “WPA/WPA2” .
  • At Wireless password we write a password that is strong, trying as much as possible to include characters, numbers and upper and lower case letters.
  • We click on “Save” .

Deactivate WPS button

Desactivar botón WPS

We can enter our WiFi network not only with the password, but also by activating this button. Although it is true that, we have to be in the presence of the router many times it is advisable to reinforce the security by disabling it completely.

Next, we’ll show you the following procedure:

  • We enter “WPS” .
  • Select “WPS Status” .
  • We disabled the option.
  • Click on “Save” .

SSID emission change

The SSID is the name by which the WiFi network is identified and is available to all persons close to the router . One way to increase security is to change the name, password and leave it at invisible .

When we make this configuration the name of the network will not appear on the devices , and they will not be able to log in, even if they use password cracking applications.

If we want to configure these elements we’ll do the following guide:

  • We enter “Wireless” .
  • We deactivate the option “SSID Broadcast” .
  • We changed the name to “Wireless Network name” .

To change the password, we’ll do

  • We enter “Tools” .
  • We choose “Password” .
  • At this point we write down the old data and enter the changes we will make.
  • Click on “OK” .

Tips to improve the security of your WiFi network so that the Internet is not stolen

Once we have identified the tools available to improve our WiFi security, it is advisable to follow the advice we will mention below so that the Internet is not stolen from us.

They are:

Change the factory SSID and password

Routers come with a factory preset name and password, even if we have purchased a neutral router or it has been delivered by our Internet service provider.

This data is available on the Internet and can be found on websites such as “Router Passwords Community Database” , where you only need to enter the brand name of the router and an 8-digit number will appear to try to access the WiFi network.

In addition, there are applications for mobile devices that use different PINs stored in their databases to carry out a massive attack on the router and thus gain access to it.

When we change the name and password we will have prevented third parties from accessing our network using this publicly available data.

Using Mac filtering

This tool offered by the router cannot be disabled if we want to keep a restricted access on the WiFi network .

Recommended for you:
How should I optimize my Internet network to play online and view streaming content without interruption? Step by step guide
 

Thanks to this filtering, will be practically impossible to access , because the router will force the device to display its network badge identification number.

Reviewing device history

With the statistics function we can see which devices are connected at the time we carry out the study.

This instrument will allow us, in a very simple way, to know exactly all the members of the WiFi network and will allow us to carry out the expulsion of them with very simple steps.

Use a strong encryption protocol

The stronger the encryption protocol, the harder it is to access the network.

When we talked, in the previous points, that there are Internet sites and mobile applications that can decipher the password, it is because they use PINs that can access the router, as long as the encryption is weak .

The most recommended protocols are in order of decreasing strength:

  • WPA2 + AES
  • WPA + AES
  • WPA + TKIP + AES
  • WPA

For all this, it is advisable to keep the encryption at the highest protocols on the list mentioned above.

Install a third party app

There are different application stores that can be installed on computers and mobile devices that will allow you to constantly inspect the network you are connected to.

The most common are:

  • Who uses my WiFi, for Android.
  • Fing, for iOS.
  • NetCut, for computers.

Detector del ladrón de WiFi - Quién usa mi WiFi?

DownloadQR-CodeWiFi Thief Detector – Who uses my WiFi? Developer:WiFi Speed Test – WiFi Router & WiFi SecurityPrice:Free

‎Fing - Escáner de red

DownloadQR-CodeFing – Network ScannerDeveloper:Fing LimitedPrice:Free+

Download NetCut Windows

Reducing the signal range

A good alternative is to reduce the range of the WiFi signal, although this will not make it impossible for an intruder to enter, but will greatly reduce the chances of an attack.

In order to make this alternative we follow these instructions:

  • We go to “Control Panel” in Windows.
  • Select “Device Manager” .
  • Click on “Network adapters” .
  • Select the WiFi card by clicking on the “Advanced Options” tab .
  • Select “Transmission power” .
  • We choose the value we want , in a range of 1 minimum and 5 maximum.
  • Click on “OK” .

Invisible emission of the signal

We can configure from our router that the signal from the WiFi network does not appear in the nearby devices .

This is a great alternative that will considerably increase the efficiency of the security, as it will be very difficult to access as it will not be detected by intruders.

If you have any questions, leave them in the comments, we will answer you as soon as possible, and for sure it will be of a great help for other members of the community. Thank you! 😉

 
 

Leave a Reply

Your email address will not be published. Required fields are marked *