Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Powerline Adapters

Posted on 2013-06-19
4
Medium Priority
?
227 Views
Last Modified: 2013-06-19
I have a very strange situation. I was at a client and we had to use Powerline adapters for a network point.
When I plugged in the powerlines I noticed that another router was broadcasting on his network. Actually then I realized it was his neighbor's router!!
If powerlines manage to travel on the electricity company grid, this is a big security flaw!
I was in his neighbor's network obviously!
Does any expert know if this might happen?
To be honest I immediately suspected that his neighbor might be steeling electricity (maybe) from my client.

Any engineer can explain this from a technical side of view?

Thanks in advance!
0
Comment
Question by:pcgeneration
  • 2
  • 2
4 Comments
 
LVL 44

Accepted Solution

by:
Darr247 earned 2000 total points
ID: 39259843
Apparently the 2 residences are on the same transformer, and the neighbor uses powerline adapters too. Both without security enabled on either set of the powerline adapters.

No different than setting up WiFi with no passphrase, really... except Windows won't warn you about that being a possible security vulnerability since manufacturers figure if you have physical access to the network cable you must be allowed to be there.

While it's common for multiple buildings to share the same step-down transformer from the transmission line voltage, their metering typically occurs at the service entrance.

Enable the built-in security on the customer's powerline adapters (usually done with a semi-automatic "pairing" sequence), and the neighbor won't be able to access the customer's network.
0
 

Author Comment

by:pcgeneration
ID: 39259939
Cheers Darr247 for your quick and technical reply.
0
 
LVL 44

Expert Comment

by:Darr247
ID: 39259961
No problem... I didn't know to what level of 'technical' you wanted to go after the deduction that both the customer and neighbor's service drops came from the same transformer... like how transformers work, voltage drop, ampacity, et cetera.

> If powerlines manage to travel on the electricity company grid, this is a big security flaw!

The transformers used by utilities - to step the voltages up (to essentially increase ampacity and make up for voltage drop) during transmission, and step them down for typical usage levels - are the main impediment to Ethernet over Powerlines on a large scale... otherwise most people would get their internet connections from the electrical grid by now.

All powerline adapters I've ever seen had security built-in... all you have to do is enable it. Also, just like wireless routers used to come with security disabled but most now have it enabled by default, most powerline manufacturers are now starting to ship the devices with security enabled by default, too, so they won't work without going through the 'pairing' sequence.
0
 

Author Comment

by:pcgeneration
ID: 39259977
Thanks for the further explanation. Much appreciated.
0

Featured Post

Configuration Guide and Best Practices

Read the guide to learn how to orchestrate Data ONTAP, create application-consistent backups and enable fast recovery from NetApp storage snapshots. Version 9.5 also contains performance and scalability enhancements to meet the needs of the largest enterprise environments.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

WARNING:   If you follow the instructions here, you will wipe out your VTP and VLAN configurations.  Make sure you have backed up your switch!!! I recently had some issues with a few low-end Cisco routers (RV325) and I opened a case with Cisco TA…
This article will show you step-by-step instructions to build your own NTP CentOS server.  The network diagram shows the best practice to setup the NTP server farm for redundancy.  This article also serves as your NTP server documentation.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…

926 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question