Mobile & IoT Security

SSID

About 4 min read

What Is SSID

SSID (Service Set Identifier) is the name that identifies a Wi-Fi network. When you open the Wi-Fi settings on your phone or computer, the network names you see are SSIDs.

An SSID is a string of up to 32 bytes, periodically broadcast by the access point (router) in beacon frames. Devices receive these beacons and display available networks.

A single router can host multiple SSIDs. Home routers typically use separate SSIDs for 2.4 GHz and 5 GHz bands, while enterprise environments separate guest and corporate SSIDs for network segmentation.

Stealth SSID - Effectiveness and Limitations

Stealth SSID (disabling SSID broadcast) prevents the network name from appearing in device Wi-Fi lists. While it seems like a security improvement, its actual effectiveness is limited.

  • Probe requests expose it: Devices already connected to a hidden SSID constantly send probe requests asking "Is this SSID available?" Attackers can intercept these to identify the SSID.
  • Network analysis tools detect it: Tools like Wireshark and Kismet easily reveal hidden SSIDs. Hiding only makes the network harder to see, not invisible.
  • Reduced usability: New devices must manually enter the SSID, adding operational friction.

The Wi-Fi Alliance and most security experts do not recommend stealth SSID as a security measure. Strong encryption (WPA3) and complex passwords are far more effective.

Evil Twin Attacks

An Evil Twin attack involves setting up a rogue access point with the same SSID as a legitimate network to trick users into connecting.

  1. The attacker creates an access point matching a public Wi-Fi SSID (e.g., Free_WiFi) with stronger signal strength, causing devices to auto-connect to the fake AP.
  2. All traffic from connected users passes through the attacker, who can intercept unencrypted HTTP communications to steal passwords and credit card numbers.
  3. Some attacks display fake captive portals prompting users to enter email addresses and passwords.

Defenses include using a VPN on public Wi-Fi, only visiting HTTPS sites, disabling auto-connect, and in enterprise environments, deploying 802.1X authentication with RADIUS servers for certificate-based verification.

Safe SSID Naming Practices

  • Avoid personal information: Names like Tanaka_Home or Room301 reveal the owner or location to potential attackers.
  • Change default SSIDs: Factory defaults like NETGEAR-5G-1234 reveal the router manufacturer and model, enabling targeted attacks against known vulnerabilities.
  • Skip provocative names: HackMeIfYouCan only attracts unwanted attention with no benefit.
  • Distinguish bands when needed: MyNetwork_2G and MyNetwork_5G help users choose the right band, though modern routers with band steering handle this automatically.

More important than SSID naming is enabling WPA3 (or at minimum WPA2) encryption with a strong, long password. MAC address filtering provides supplementary protection but is easily bypassed through MAC spoofing.

Common Misconceptions

Hiding the SSID makes Wi-Fi secure
Hidden SSIDs are easily detected through probe requests from connected devices and network analysis tools. Real security comes from encryption strength and password complexity, not SSID visibility.
Networks with the same SSID are the same network
SSID is just a name - multiple access points can share the same SSID. Evil Twin attacks exploit this. A matching SSID does not guarantee you are connected to the legitimate access point.
Share

Related Terms

Related Articles