Solved

Powerline Adapters

Posted on 2013-06-19
4
225 Views
Last Modified: 2013-06-19
I have a very strange situation. I was at a client and we had to use Powerline adapters for a network point.
When I plugged in the powerlines I noticed that another router was broadcasting on his network. Actually then I realized it was his neighbor's router!!
If powerlines manage to travel on the electricity company grid, this is a big security flaw!
I was in his neighbor's network obviously!
Does any expert know if this might happen?
To be honest I immediately suspected that his neighbor might be steeling electricity (maybe) from my client.

Any engineer can explain this from a technical side of view?

Thanks in advance!
0
Comment
Question by:pcgeneration
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 44

Accepted Solution

by:
Darr247 earned 500 total points
ID: 39259843
Apparently the 2 residences are on the same transformer, and the neighbor uses powerline adapters too. Both without security enabled on either set of the powerline adapters.

No different than setting up WiFi with no passphrase, really... except Windows won't warn you about that being a possible security vulnerability since manufacturers figure if you have physical access to the network cable you must be allowed to be there.

While it's common for multiple buildings to share the same step-down transformer from the transmission line voltage, their metering typically occurs at the service entrance.

Enable the built-in security on the customer's powerline adapters (usually done with a semi-automatic "pairing" sequence), and the neighbor won't be able to access the customer's network.
0
 

Author Comment

by:pcgeneration
ID: 39259939
Cheers Darr247 for your quick and technical reply.
0
 
LVL 44

Expert Comment

by:Darr247
ID: 39259961
No problem... I didn't know to what level of 'technical' you wanted to go after the deduction that both the customer and neighbor's service drops came from the same transformer... like how transformers work, voltage drop, ampacity, et cetera.

> If powerlines manage to travel on the electricity company grid, this is a big security flaw!

The transformers used by utilities - to step the voltages up (to essentially increase ampacity and make up for voltage drop) during transmission, and step them down for typical usage levels - are the main impediment to Ethernet over Powerlines on a large scale... otherwise most people would get their internet connections from the electrical grid by now.

All powerline adapters I've ever seen had security built-in... all you have to do is enable it. Also, just like wireless routers used to come with security disabled but most now have it enabled by default, most powerline manufacturers are now starting to ship the devices with security enabled by default, too, so they won't work without going through the 'pairing' sequence.
0
 

Author Comment

by:pcgeneration
ID: 39259977
Thanks for the further explanation. Much appreciated.
0

Featured Post

WordPress Tutorial 4: Recommended Plugins

Now that you have WordPress installed, understand the interface, and know how to install new parts, let’s take a look at our recommended plugins.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
This article is a collection of issues that people face from time to time and possible solutions to those issues. I hope you enjoy reading it.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question