CyberTakes

How to Secure Your Personal Area Network (PAN)

image - Internet of things

Secure Your Personal Area Network

This article discusses security for personal area networks (PANs).

This article sheds light on how to secure your Personal Area Network

In a Hurry? Skip ahead, How to Secure Your Personal Area Network

But, before we discuss how to secure your Personal Area Network, let’s see what a Personal Area Network is and how it works. This article describes the two types of personal area networks, and their advantages and disadvantages. This article also discusses security issues that are associated with Personal Area Networks, and how to mitigate the risks.

What is a Personal Area Network (PAN)?


A Personal Area Network (PAN) is, “a computer Network for interconnecting electronic devices centered on an individual person’s workspace.”

Wikipedia

Also to be pointed out is that there is actually a standard created by the Institute of Electrical and Electronics Engineers (IEEE). The standard is IEEE 802.15. Also to be noted that coverage of a Personal Area network is typically around 10 meters (30 feet or so), depending on the environment and the specific transmission standard used.

That 10 meters that extends in all directions around a person is also known as the “bubble”. The bubble is the person’s Personal Operating Space (POS). The most common method of connecting the devices in a Personal Area Network is Bluetooth. The network environment is intended to be low complexity, low cost, lower power, and robust.

Although there are many subtleties within the Personal Area Network technology our main concerns are:

As seen in the image above a Personal Area Network can consist of many different devices. Some devices may share resources while others simply communicate with one another. Most of these devices will perform some type of task on command. We can think of a Personal Area Network as an office environment, or perhaps simply the immediate area around you as you travel throughout the day, whether walking, riding, or driving.

Why it’s Important to Secure Your Personal Area Network

Just like with all other types of networks protecting our personal and confidential information is important. Another important aspect to consider is our privacy, like, our conversations, actions, and our location. To better understand why and how to secure your Personal Area Network there are two words to focus on: Privacy and Security.

Privacy

Privacy is the act of protecting personally identifiable and other sensitive information.

Security

Security is the technologies and methods that protect against unauthorized access to data.

What can happen if your Personal Area Network is hacked?

Although Personal Area Networks are usually confined to a small area, once compromised the damage can reach out to other places in your life. For instance, once the network is hacked, criminals can access and steal your personal information, upload malware, and intercept communications. When all things are considered it’s easy to realize that you must secure your Personal Area Network.

Once a single device is compromised within your network a hacker may be able to successfully infiltrate other parts of your personal or home network. They can initiate spoofing attacks and even use your network to attack other networks. Once a Personal Area Network is infiltrated all devices that share a connection may be in jeopardy.

Read more: How to secure a home wireless router


Types of Personal Area Networks (PAN)

There are basically two types of Personal Area Networks:

Examples of Personal Area Networks

Whether a wired or wireless network there are three main groups Personal Area Networks can belong to:

Personal Area Networks are Used in Many Environments


Photo created by tirachardz

Personal Area Network Security Issues

In order to secure your Personal Area Network (PAN), it is necessary to realize the vulnerabilities and security issues inherent to this type of network. These networks are different than Local Area Networks in the sense that Personal area networks typically operate outside of the Local Area Network environment but are typically connected to it.

This is usually always the case in a home office environment. Because Personal Area Networks are segmented a typical vulnerability scan of the local network may not detect vulnerabilities that exist within the PAN. There may be several devices within a PAN and they represent a security risk that could be used by a cybercriminal (hacker) to infiltrate the PAN and then use lateral strategies to obtain access to the rest of the network.

A PAN can be looked at as a network of Internet of Things (IOT) devices. That’s really what it is. Many IOT devices have inherent security vulnerabilities. Remember, your PAN is only as secure as your most vulnerable connected device. A PAN has its advantages, but, it also creates possible security vulnerabilities.

Read more: 5G and IOT security vulnerabilities

Following is a list of the main vulnerabilities:

Read more: Why it is important to secure a wireless network


How to Secure Your Personal Area Network

By following these guidelines you can secure your Personal Area Network. Following are mitigation techniques to counter the main vulnerabilities.

Ensure Location Privacy

A major security problem in a Wireless Personal Area Network is location privacy. Fortunately, there are solutions to this problem. The fix is to make sure that the attacker can not determine the exact identity of the device. Always use the latest Bluetooth version available. Keep your device’s software up-to-date. And, the most important action; only enabled location services when necessary. Use Airplane Mode when the device is not in use. Even while in Airplane Mode ensure Bluetooth and Wi-Fi are turned off or in “non-discovery” mode.

Mitigate IOT Vulnerabilities

It is not possible to secure your Personal Area Network if you don’t address IOT device vulnerabilities. Make sure all devices connected to your PAN are from trusted vendors. The vendors should offer updates as necessary. Also, ensure during the setup process that all default passwords on the devices are changed. Always use complex and unique passwords. Avoid Plug-in-Play features on devices, always configure each device on its own.

Read more: What is a complex and unique password?

When using a Personal Area Network in a home office environment always configure a separate network for the IOT devices, printers, and any other connected devices. This segmentation of networks can prevent a successful attack from becoming a complete security nightmare. Most modern wireless home routers offer this functionality.

Read more: How to Setup and Secure a Home Network Wireless Router

Mitigate Bluesnarfing Attacks

Bluesnarfing is not a new type of attack, but it’s no less vicious than other types of attacks. Use the typical preventative Bluetooth tactics to fight Bluesnarfing, remember it’s another type of Bluetooth attack. In addition, never accept pairing requests that you are not expecting. In your phone settings, require user approval for all connection requests.

One note: When pairing a new device for the first time ensure you are in a private area. Don’t pair new devices in a public setting. First time pairing is when initial authentication and approval occurs. These processes are vulnerable to malicious interception and man-in-the-middle-attacks.

Let’s Sum it Up

It’s up to you to secure your Personal Area Network. Some security challenges are due to a lack of user awareness. Always be aware of your surroundings and if you detect abnormal activity, or anything that indicates a possible attack, immediately disconnect all devices from your network. Even on cellphones it is important to maintain up-to-date-anti-virus software.

Always purchase IOT devices from trusted manufacturers. Never use default passwords. In a home office environment always segment your PAN from your household wireless network. Especially in public, do not connect a device for the first time, and do not accept connection requests. Always turn off services you are not using, including Wi-Fi, Bluetooth, location services, and use Airplane Mode when appropriate.


What are the 10 types of computer networks?

1) LAN (Local Area Network) 

2) WAN (Wide Area Network)

3) WLAN(Wireless Local Area Network)

4) MAN(Metropolitan Area Network)

5) CAN (Campus Area Network)

6) PAN (Personal Area Network)

7) SAN ( Storage Area Network or System Area Network)

8) POLAN (Passive Optical Local Area Network)

9) EPN (Enterprise Private Network)

10) VPN (Virtual Private Network)


Read more: Don’t Become a Victim of Cybercrime – Read This!

Read more: Protect yourself from online Identity theft

Read more: Would you know if you were a victim of a cybercrime?

Read more: Understanding the Deep Web and the Dark Web

Read more: Protect Your Identity from being stolen on the Internet


Exit mobile version