In Part I of this tutorial, I explained how I performed a war drive to collect useful information, such as the percentages of homes and businesses that use encryption, hidden SSIDs, and default RF channels. For example, many access points are tuned to the factory default channel. This can limit the capacity of your WLANs if residing in areas with many separate networks, such as apartment complexes and business parks. As a result, be certain to analyze the local radio environment and possibly set your access points to non-default channels.
In this part of the tutorial, we’ll take a look at the results of the WorldWide WarDrive (WWWD), an organization with the goal of promoting a more secure wireless networking community, and compare the WWWD results to the war drive I described in Part I. This will provide a good idea of the trends related to Wi-Fi network configurations and security.
For four years, with help from thousands of people ranging from security professionals to enthusiasts driving around and capturing information from hundreds of thousands of wireless access points and routers, the WWWD collected configuration information of wireless LANs. The WWWD is no longer collecting data, but the statistics from their organized war drives are still posted on their website. They believe all the hard work paid off and their mission, to create awareness of security issues, was completed.
The figure below shows the results of my war drive, with homes and businesses combined, and the results of WorldWide WarDrives in 2002, 2003, and 2004. This provides a good comparison and shows the changes in the behavior of the administrators of wireless networks in the past several years. Of course, I didn’t capture as much data as the thousands of people did for the WWWD’s. Nevertheless, I believe that I came up with some relevant results.
Comparison of Wireless LAN Statistics (click for full image)
Despite a few hiccups along the way, all the issues discussed in Part I have improved during the last several years. For example, as you can see, the most significant jump was between 2004 and 2006 for the percentage of wireless networks using encryption. In these years, the use of encryption doubled. Users and administrators are getting the right idea.
Encryption is certainly important, but remember to use not just one security mechanism, but many. For every new security method, there will be people poised to break it. Implementing security methods in layers provides a higher level of security. In addition to using encryption, consider not broadcasting the service set identifier (SSID). Also, the use of VPNs can offer a higher degree of security, even when operating wireless devices from public networks.
The decrease of out of the box setups without configuration changes and the use of fewer default SSID settings, as shown in my data, also indicate a move in the right direction. This means that users are getting more comfortable with configuring wireless LANs, and the networks have higher resulting levels of security and performance!
Eric Geier is a computing and wireless networking author and consultant. He’s employed with Wireless-Nets, Ltd., a consulting firm focusing on the implementation of wireless mobile solutions and training. Eric is also an author and contributor of several books and eLearning (CBT) courses.
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
FEATURE | By Samuel Greengard,
November 05, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
FEATURE | By Cynthia Harvey,
October 07, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
Top 10 Machine Learning Companies 2020
FEATURE | By Cynthia Harvey,
September 22, 2020
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
Anticipating The Coming Wave Of AI Enhanced PCs
FEATURE | By Rob Enderle,
September 05, 2020
The Critical Nature Of IBM’s NLP (Natural Language Processing) Effort
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
August 14, 2020
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.