Share This:

ad hoc

When Hurricane Helene tore a path of destruction from the Gulf Coast to the North Carolina mountains during the summer of 2024, cell phone towers were toppled, and internet service was knocked out. However, emergency responders were not left completely without communication. Devices carried by first responders acted as transmitters and receivers, creating a mesh network without relying on any centralized infrastructure. With this in place—known as an ad hoc network— first responders and emergency personnel were able to share crucial information like maps, medical records, and real-time updates, enabling them to rapidly coordinate rescue operations even in remote areas, temporarily until normal infrastructure was restored.

Because of their versatility and portability, wireless ad hoc networks have been gaining popularity. According to Industry Arc, the global Wireless ad hoc network market size was $647.50 Million in 2022 and is projected to grow to $1078.17 Million by 2030, at a CAGR of 8.87 percent during the forecast period.

Industry Arc reports that “the increasing adoption of IoT devices across various industries, including healthcare, manufacturing, transportation, and smart cities, is driving the demand for wireless ad hoc networks.”

The report also shows that North America is the primary player in the ad hoc market. In 2023, the continent commanded a share close to 42 percent, followed by Europe owing to the early adoption of this product, and advancements in wireless communication technologies.

However, ad hoc networks do present some security challenges for managed service providers (MSPs).

What is an ad hoc network?

The “ad hoc” networks are named as such because they are organic, thrown-together-when-necessary “networks.” An ad hoc network usually refers to a type of local area network (LAN) built spontaneously to enable two or more wireless devices to be connected without requiring typical network infrastructure equipment, such as a wireless router or centralized access point.

A PC, laptop, or smartphone Wi-Fi interface is usually used to build an ad hoc network. In other situations, devices such as wireless sensors are designed to work primarily in an ad hoc mode.

Most popular laptop computers, particularly those equipped with 802.11-type Wi-Fi wireless networking cards, can create ad hoc networks if they are within range of one another. These networks enable computer-to-computer connections.

Ad-hocs are effective for sharing files and documents and forming impromptu work groups. However, these peer-to-peer, computer-to-computer connections can result in security concerns.

An attacker, for instance, with a network card configured for ad hoc mode and using the same settings as your computer, may gain unauthorized access to sensitive files. Many PCs ship from the manufacturer with wireless cards set to ad hoc mode by default.

So, how can MSPs keep these networks from becoming a security liability?

Steps MSPs can take

SmarterMSP.com reached out to two experts in ad hoc networks to see what MSPs should be doing to keep these networks safe.

Gene Stevens, Chief Technology Officer, cybersecurity expert, and co-founder of ProtectWise says that ad hoc networks can benefit from quick, temporary connectivity, “But their lack of centralized control makes them inherently vulnerable to cybersecurity risks”

Stevens advises that MSPs take three actionable steps to enhance the security of these networks:

  1. Enable encryption and authentication protocols including WPA3 to ensure that only authorized devices can connect and that data transmissions are secure.
  2. Implement endpoint protection and monitoring to detect and mitigate malware or unauthorized access attempts on devices participating in the network.
  3. Educate users about security hygiene such as avoiding sensitive transactions over ad hoc networks and regularly updating device software to reduce human error and the risk of exploitation.

More expert advice on securing ad hoc networks for MSPs

“By taking these measures, MSPs can help safeguard temporary networks against common cyber threats,” Stevens notes.

Chandrasekhar Bilugu is the CTO of security firm SureShield and Aegify. Bilugu works with several MSPs and partners, so he views ad hoc networks from several directions. Bilugu provided SmarterMSP.com with some additional advice on steps that MSPs can take to keep ad hoc networks safe. Among them are:

  • Use end-to-end encryption to protect data in transit. This ensures that even if data is intercepted, it cannot be read without the decryption key.
  • Employ secure key management practices to distribute and manage encryption keys effectively.
  • Implement mutual authentication to ensure that devices can verify each other’s identity before establishing a connection.
  • Deploy intrusion detection systems (IDS) to monitor network traffic for suspicious activities and potential threats.
  • Use network segmentation to isolate critical parts of the network and limit the spread of any potential breaches.
  • Use multiple routes for data transmission to ensure network availability even if one path is compromised.
  • Implement failover mechanisms to maintain network functionality in case of device failure or attack.

Wireless ad hoc networks have proven vital tools in emergency response, offering resilient, temporary communication in the face of disaster. As demand for ad hoc networks grows, MSPs must be aware of the security challenges these networks present. They must also recognize the growing role of ad hoc networks in sectors like healthcare, manufacturing, and smart cities. This awareness will help MSPs take the necessary steps to protect their clients’ infrastructure.

Photo: chombosan / Shutterstock


Share This:
Kevin Williams

Posted by Kevin Williams

Kevin Williams is a journalist based in Ohio. Williams has written for a variety of publications including the Washington Post, New York Times, USA Today, Wall Street Journal, National Geographic and others. He first wrote about the online world in its nascent stages for the now defunct “Online Access” Magazine in the mid-90s.

Leave a reply

Your email address will not be published. Required fields are marked *