Wi-Fi Security System Based on Innovative Technology
[1]
Tanuj Tiwari, Department of Computer Science, University of Texas, Dallas Richardson, U.S.A..
[2]
Tanya Tiwari, Samsung India Electronics, Pvt. Ltd, India.
[3]
Sanjay Tiwari, SoS in Electronics & Photonics, Pt. Ravishankar Shukla University, Raipur (CG), India.
Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high speed Internet and network connections. Every device has a unique MAC Address used for identifying devices connected over Wi-Fi. Since virtually every device now in the market is Wi-Fi capable, MAC address can be considered as a universal identifier. This paper proposes innovative approach to use the MAC Address as an authentication method.
[1]
Lemstra W., Hayes V., John Groenewegen J. 2010 The Innovation Journey of Wi-Fi: The Road to Global Success, Cambridge University Press.
[2]
Ballmann B. 2015 Wifi Fun. In: Understanding Network Hacks. Springer, Berlin, Heidelberg.
[3]
Alotaibi B, Elleithy K. 2016 A New MAC Address Spoofing Detection Technique Based on Random Forests. Reindl LM, ed. Sensors (Basel, Switzerland); 16 (3): 281. doi: 10.3390/s16030281.
[4]
Holt A., Huang C. Y., 2010 802.11 Wireless Networks: Security and Analysis Springer; 2010 edition.
[5]
Ahammed S. S., Pillai B. C., 2013 Design of Wi-Fi Based Mobile Electrocardiogram Monitoring System on Concerto Platform Engineering, Volume, Pages 65-73.
[6]
Bin Yu., Lisheng Xu., Yongxu Li, 2012“Bluetooth Low Energy (BLE) Based Mobile Electrocardiogram Monitoring System”, Proceeding of the IEEE International Conference on Information and Automation Shenyang, China.
[7]
Rolf Nilsson and Bill Saltzstein, 2011 “Wireless Low Energy Technology Makes New Medical applications Possible” http://www.medicalelectronicsdesign.com/article.
[8]
Kolias, C.; Kambourakis, G.; Stavrou, A.; Gritzalis, S. Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset. IEEE Commun. Surveys Tutor. 2015, 99, 184-208.
[9]
B. Bloessl, Sommer, C., Dressler, F., Eckho D. 2015 The scrambler attack: A robust physical layer attack on location privacy in vehicular networks. In ICNC.
[10]
Brik V., Banerjee S., Gruteser M, S. Oh S. 2008 Wireless device identi_cation with radiometric signatures. In MobiCom.
[11]
Carlos P. O., Bernardos J, Carlos J., Niga Z. U. 2015 Wi-Fi internet connectivity and privacy: hiding your tracks on the wireless internet. In IEEE CSCN.
[12]
Mohammed Abbas Fadhil Al-Husainy MAC Address as a Key for Data Encryption International Journal of Computer Science and Information Security, Vol. 11, No. 11, 2013.
[13]
Jonker P. M., Preface W, 2009, “Special issue on secure data management,” Journal of Computer Security, 17 (1), pp. 1-3.
[14]
Lei M., Z. Qi, X. Hong, and S. V. Vrbsky, 2007, “Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks,” in Proc. of the 2007 Intelligence and Security Informatics (ISI’07), New Brunswick, New Jersey, USA. IEEE, May.
[15]
Danev B, Zanetti D., Capkun S. 2012 On physical-layer identication of wireless devices. ACM Computing Surveys (CSUR), 45 (1): 6.
[16]
https://www.lifewire.com/enabling-mac-address-filtering-wireless-router-816571