I. INTRODUCTION
Public free Wi-Fi is now available in many places. The airport, hotels and cafes all offer free Internet access as an additional benefit of using the service. It's really good formany people to have free access to the Internet. In particular, office workers who frequent business trips or work outside of the country can send e-mails via free Wi-Fi or share documents online. However, contrary to the opinion of most Internet users, using public Wi-Fi is quite d angerous, and most of the wireless Internet's also associated with people trying to make mid-term attacks Middleman Manrefers to the communication with the Middle of malice [1-3]. There are two, in, and various types of intermediary attacks that people intercept between groups, but the most common method is to intercept a user's request to access a website and send a response to a fraudulent webpage that appears to be legitimate. For example, a hacker who intercepts her communications to an email that Alice is about to access may use a private conversation to trick users into entering important data into a fake website, since there are many cases where her hacker receives Alice's information and login, such as phishing a contact email to a list of more malicious acts, such as sending her password to a list of the Wi-Fi. This wireless Wi-Fi system has many vulnerabilities. Therefore, this paper proposes block chain-based Wi-Fi service for safe and fast communication using block chain technique.
II. Related Research
This paper deals with the weak points in Wi-Fi's wireless communication and the improvements in blockchain and various problems. Also, the concept and characteristics of block chain are reviewed to deal with the direction of overcoming vulnerabilities in the use of open block chainand certain blockchain services in order. Also, the Wi-Fisystem, blockchain system, and blockchain application methods are studied in advance [4-6].
2.1. Wi-Fi
Wi-Fi is a technology that allows electronic devices to connect to a wireless LAN (WLAN), mainly using the 2.4 gigahertz (12-centimeter) UHF and 5 gigahertz (6-centimeter) SHF ISM radio bands. Although wireless LANs are generally password protected, they are also open to any device located within the band to access theresources of the wireless LAN network. Wi-Fi Alliancedefines Wi-Fi as any "WLAN" product based on the Electronic Engineers Association (IEEE) 802.11 standards.Wi-Fi is one of the trademarks of Wi-FiAlliance [7-9].
The Wi-Fi Certified trademark is only available for Wi-Fi products that are fully qualified for Wi-Fi Alliance interoperability certification tests. Devices using Wi-Fitechnology include personal computers, video gameconsoles, smartphones, digital cameras, tablet computers, digital audio players and modern printers. Wi-Fi-compatible devices can access the Internet through WLAN networks and wireless access points. Theseaccess points (hotspots) have a band of approximately 20 meters (66 feet) indoors and larger outdoors. The hotspotsupport range can be supported only by small rooms withwalls that block radio waves, and can be extended toseveral square kilometers by overlapping access points.
Wi-Fi is less secure than wired connections such as Ethernet because intruders do not need to make physical connections. Web pages using TLS are secure, butunencrypted Internet access can be easily found by intruders. For this reason, Wi-Fi is adopting a variety of encryption technologies. The initial encryption WEP could be easily penetrated. Higher quality protocols (WPA, WPA2) were later added. The optional featureadded in 2007 - Wi-Fi protection setup (WPS) - had serious flaws that enabled an attacker to identify therouter 's password. Since then, Wi-Fi Alliance hasupdated its test plan and certification programs to ensurethat newly certified devices can resist attacks [10-14].
Fig. 1. Architecture for Wi-Fi.
2.2. Blockchain
Blockchain is a technology that ensures integrity and reliability without authorized third parties by jointly verifying, recording, and storing transaction information by all participants in the network. Based on Distributed Ledgertechnology, it features a ledger that holds all transactionalinformation that occurs in peer-to-peer networks (P2P) networks, all nodes store and update, and maintain the integrity of the data. Because of this, Goldman Sachs alsodefines blockchain as a "shared and distributed transactiondatabase designed to increase transparency, security andefficiency of transactions." Although the definition of block chain varies slightly from institution to institution, most of the features have something in common. In other words, it has something in common in that it enabled the implementation of various application services based on adistributed network infrastructure utilizing security technologies such as hash, electronic signature andencryption. In addition, blocks stored on each node include information from the previous block (hash values), current transaction information, and hash values, which aredifficult to manipulate and enable transparent management of transaction information [15-19]. It presents characteristics (center) of blockchain technology at the PWC and what can be improved by doing so (correcting the problems on the left as shown on the right). Based onencryption, blockchain can "see the scope of its servicesthat are programmable (or programmable) such as Smart Contracts while aiming (or supporting) for Immutable, Transparent, Distant, and Consensus." Due to the possibility that it can be "expanded," there are expectations for various industrial applications. Looking at this around tasks that are being applied with blockchain, one can seemore clear characteristics. In another report, McKinsey identified blockchain utilization as "Record Keeping" and " Transaction. " Record keeping is also based on the integrity of the blockchain. As a static storage area, information suchas reference day sites (real estate registration, patents) oridentity information (citizenship, voting rights) and smart contracts are recorded. While smart-system drugs may contain a variety of content, once defined contracts do not change frequently. On the other hand, transaction related data are viewed [11]. If record keeping focuses on safestorage, the transaction is considered relatively dynamicand a registry for managing the change. This addresses theongoing updates to the books, such as asset exchanges and payments. Blockchain-based payment services such as bitcoin are available because the blocks that are created arestill connected and traceable to the transaction details. Therefore, this application may also be used to assist inactivities such as improving the status of changes inownership or visibility of the supply chain. summarizes major blockchain services by industry/task based on twobasic functions presented by McKinsey [20-22].
Fig. 2. Advantage of Blockchain.
2.3. Blockchain Application
The Harvard Business Review suggested that block chainhas the potential to create a new foundation for e conomicand social institutions as a Foundational technology, justlike TCP/IP did in the past. The underlying technologyneeds a little more time before it has a clear effect, but its ripple effect is relatively large. The most devastating advantage that blockchain can provide is that it can replacethe role of existing third-party trust organizations through the formation of technology-based trust. This requires notonly blockchain technology, but also overall changes from the role of business ecosystem members and the way they work. It can be expected that it will be a base technology that supports digital switching society along with issuessuch as spreading IoT and digitizing assets, growth of big data industries that are linked to personal identification rights and GDPR, cloud-based SW services, and AI [23-25]. Therefore, more time may be needed for the visible effect. In a report released in 2015, the WEF saw the full-fledgedignition point of blockchain Surveyor (Tippoint) as the time when the value of 10 percent of global GDP was stored on block chain platforms. Based on the timing of the report' sannouncement, the report is expected to be around 2025, about 10 years later. As to when blockchain will beactivated, Gartner offers a similar opinion. Blockchain ispassing through a "Through of Disposal" for technology, which means that time and support are needed for large-scale spread and commercial success cases [12]. Together, the Katner Heif cycle and Geoffrey Moore's Kasms curveconfirm that it is time for the blockchain to reduce the gapto enter the mainstream market. And that period is viewed by most agencies as around the next five to 10 years. Intimes when excessive expectations about technology areremoved, however, early products are known to fail, leading to a sudden drop in market interest or a shift away from public attention. Deloitte also announced at Githe ub(github.com) that only about 6 percent of the 86,000 block chain projects under way could last. Therefore, abusiness model that can bring about gradual changes is alsoneeded to minimize the space of the casserole and quickly access the liquor market. This can lead to a process of securing a variety of use cases and embedding technologies that can be applied in real business environments. Through such a technology re-lighting system, the system continues to stabilize, and if the entire blockchain e cosystem-scaleeconomy is achieved, innovative services can also developto the level of commercialization. Blockchain is not merely an improvement in the process, but it is considered to be adisruptive technology as soon as its potential is maximized. To this end, the market should be created along withinnovative services and gradual models. In fact, block chainis an infrastructure technology that is used to improve business processes through a sustainable business model, along with a disruptive business model. If disruptive andinnovative changes can give startups new opportunities, gradual process improvements can help existing firms continue their competitive advantage.
MIT Sloan School has presented a business model thatutilizes blockchain in the media industry with a disruptive form, as well as a sustainable model. A disruptive model is a service model that can pose a potential threat to existing businesses. The first may take the form of a "Stemit" that " provides revenue to both creators and managers." Stimit' screator can be rewarded for writing in itself, and curators who work on sites and make recommendations for goodarticles will also be rewarded. If existing blogging services relied on advertising revenue from power bloggers, they could be differentiated in that they could focus more on the content itself. The second form of a disruptive model, " One-Stop Content Shop," can also be seen as a business modelthat can change the distribution process of existing digital content. Wojo Music (https://ujomusic.com) is an example of an artist's goal of securing profitability. For song writersor performers, the profit ratio can be adjusted through smart contracts and the profit structure can be improved by selling songs directly to end consumers. If the disruptive model could have been an opportunity for new companies to grow, the "Sustaining" model can be used to strengthen the competitiveness of existing companies or target nichemarkets. The first example is to improve the content distribution process and provide revenue through copyright with the aim of "protecting IP" the creator. Kodak once introduced a service called Kodak One based on block chain. Here, it tracks the use of images registered with AI-based Web crawling and image recognition technology and protects the rights of photographers to return copyright fees by detecting illegal use. Kodak announced that it has made$1 million worth of revenue from revenue from copyrightrates since 2018. The second "digitalization of the value chain " is aimed at optimizing the value chain to proceed therevenue distribution process more quickly and accurately. This model is similar to Uzzo Music, but it can be seen as amodel that is being offered to participants in the value chain of the existing music industry. Sportipay said it will take over blockchain technology firm Media Chain Lab in 2017 and introduce blockchain in resolving issues such as copyright management and royalty payments. The third is a case in which ownership of a particular game item in the form of "transaction of game assets" can be utilized without being limited to that game. By doing so, it can improve the utilization of digital assets through cryptocurrency such as Kryptonite and Game item transactions.
Fig. 3. Tetradian Consulting (Tom Graves Linkedin page).
III. A Security Model Based on Blockchain-Based Wi-Fi
Given that blockchain is an important value in enablinginter-participant transactions without the need forintermediaries or trusted third-party trust parties, one of the key aspects of the blockchain-based business model is, afterall, technological substitution of the role of intermediarypipe. Therefore, a two-sided, market-driven platformbusiness that connects two types of user groups, such assuppliers and consumers, is one pillar. The key to the two-sided market is to first grow the size of one of the two types and thus create a virtuous circle structure in which the othergroup grows the size. Stimit or Uzzo Music in the disruptiveenemy model we discussed earlier can be seen as a business that should take particular account of the characteristics of these platform businesses. It is essential to present new markets or values and elaborate implementation of a re wardsystem called token to the group of participants. In addition, considering a fully distributed format, the substantial coordination cost to implement and maintain a system of agreement among p2p participants should also beconsidered. At the same time, there is the difficulty of presenting better value than similar platform service models based on the existing Internet economy. In fact, public block chain-based services offer the ideal business, but they are still making various attempts at the level of white paperor proof of concept (PoC). However, we want to use these Wi-Fi wireless Internet vulnerabilities to apply them to the security model [13].
In addition, in order to lead a sustainable business, anaccurate analysis of the problem (Pain Point) and a value proposition must be made. Companies such as IBM and PWC are proposing methodologies to identify problems. Tolimit the area or task to which blockchain technology will be applied, conduct workshops to identify the business flowand key participants to identify the problems that customers are currently facing. In addition, a similar use case witheach industry customer presents a specific approach thatincludes the ideas and application priorities that can be used for the project. Subsequently, prototype (or PoC) is carried out around the selected priority tasks to verify block chaintechnology within 2-3 months. Until now, problems and value propositions based on systematic methodologies must be presented properly to proceed to the actual stage of deployment. Successful blockchain projects require the participation of experts with knowledge of the industry ortask, as well as technology. Therefore, the focus should be on securing various 'build' cases through pilot projects, as well as the development of systematic 'procedures' and ' processes ' that derive these business process problems and apply methodologies. In addition, a variety of attackmethods based on the wireless Internet are emerging and this is to be overcome by blockchaining [14].
3.1. Wi-Fi Eavesdropping
Wi-Fi eavesdropping is a type of intermediate-personattack in which hackers use public Wi-Fi to monitor the activities of connected people. Interception information ranges from personal information to Internet traffic and search patterns.
Generally, eavesdropping begins by creating a fake Wi-Fi network with a legally-appearing name. Fake hotspots are often very similar to the names of nearby stores and companies. It is also known as Evil Twin. For example, when a consumer enters a cafe, they see three Wi-Fi with asimilar name. Café, Cafe 1 and Cafe 2 One of the three Wi-Fi options is likely to be the con artist's Wi-Fi. Hackers canuse the technology to collect data from any device thatestablishes an Internet connection, eventually stealing logincredentials, credit card information and other important data. Wifi eavesdropping is just one of the risks associated with public networks, so we recommend you not use it. If you really need to use a public Wi-Fi, make sure you checkwith the staff to see if it's real and safe.
3.2. Packet Sniffing
Sometimes criminals use certain computer programs tosteal data. These programs are known as packet sniffer, andare often used by legitimate IT professionals to recorddigital network traffic, making it easier to detect and analyze problems. However, many of these packet analysts are abused by cybercriminals who want to collect sensitivedata and engage in illegal activities. Even if nothing badhappened at first, the victims would later notice that someone had committed identity fraud against them or that the company's confidential information had somehow been leaked.
3.3. Cookies Theft and Session Hijacking
In wireless Wi-Fi, cookies are small data packets that web browsers collect from websites as a way to keep somesearch information. These data packets are usually stored locally on the user's computer so that the website recognizes the user when he or she returns. Cookies are useful because they make it easy to communicate between users and the websites they visit. For example, cookies allow users to login without entering their credentials whenever they visit aparticular webpage. Online stores use cookies to recorditems customers have previously added to their shopping carts or to manage their search activities. Cookies aresimple text files, so they won't harm your computer becausekeys or malware won't fit in. However, cookies ared angerous in terms of privacy and are often used forintermediate-term attacks.
If a malicious person can steal a cookie that he or she is using to communicate with you on the website, you can usethat information against you. This is called cookie theft and is often associated with session hijacking. Successfulsession hijacking allows an attacker to disguise himself as a victim and communicate with the website instead. This means attackers can use the victim's current session to access personal e-mails or other websites that may containsensitive data. Session hijacking generally occurs in public Wi-Fi hotspots because they are easy to monitor and much more vulnerable to intermediate-magnetic attacks.
3.4. Hijacking Method to prevent intermediate-level
attack
- Turn off all settings that allow you to automatically connect to the Wi-Fi network available on your device
- Turn off file sharing and log out any unused accounts.
- Use a password-protected Wi-Fi network if possible. If apublic Wi-Fi network is forced to be used, send importantinformation or prevent access.
- The operating system and virus vaccine should becontinuously updated.
- Avoid all economic activities, including cryptocurrencytransactions, when using public networks.
- Use websites that utilize the HTTPS protocol. However, some hackers keep in mind that the move is not the perfectsolution because of the spoofing of HTTPS.
- Virtual private networks (VPNs) are recommended if they are particularly important or require access to business-related data.
- Watch out for fake Wi-Fi networks. Don't trust Wi-Finames because they are similar to store or company names. In case of doubt, ask the staff to verify the authenticity of the network. Or you can ask them if they can borrow asecurity network.
- Turn off Wi-Fi and Bluetooth when not in use. If you d onot really need a public network, do not connect to a public network.
IV. CONCLUSION
There are many security vulnerabilities in the Wi-Fiwireless Internet. However, efforts have been made to apply them to industries around public and private block chains. In addition, the governance system, which extend sits influence in the industry group through global consortiums, etc., is rapidly advancing. The reason whyprivate blockchain projects are progressing faster thanpublic blockchain is because of the regulatory aspects of cryptocurrency, but it is starting to address clear problems with ROI in mind. The participation of market leaders and big businesses is accelerating even more, despite concerns by Boston Consulting or McKinsey that the scale has yet to show results. It also confirmed that block chain-based services do not necessarily have to be a disruptive businessmodel and that existing leading companies may be used t ofurther consolidate entry barriers. In addition, in the block chain business model, business governance issupported by technology/platforms, and the areas and methods of business consortium can be expanded in avariety of ways, which can further accelerate competitionacross industries and borders. To ensure successfulimplementation of the blockchain project, consider fromestablishing an implementation strategy to future scalability (Scale). To that end, each project should also be interested in organizing "procedures" and "methodology" that identify and analyze problems along with "builds" such as PoC and Pilots. If systematic methodologies such as Information Strategy Planning (ISP) consulting are developed, applied, and shared in blockchain support projects, the ability of domestic demand and suppliers may also be supported. The Korean ecosystem related to blockchain needs to becompetitive in technology and services before related markets reach tipping points. To this end, policies andefforts by the ecosystem will need to continue to expand the momentum gained through the "Blockchain Technology Development Strategy".
Cybercriminals are always looking for new ways to access people's data. Therefore, it is important to be carefuland alert. Here we've covered some of the risks that public Wi-Fi can present. While most of these risks can bemitigated by just using password-protected security connections, it is important to understand how these attacks work and how to prevent them from becoming the next victim. Therefore, Wi-Fi wireless Internet has many vulnerabilities. So this paper proposes on a blockchain basis.
References
- Nakamoto S., "Bitcoin: a peer-to-peer electronic cash system," pp 1-9, 2008.
- J-H Huh and K Seo, "Blockchain-based mobile fingerprint verification and automatic log-in platform for future computing," The Journal of Supercomputing, Springer, pp.1-17, 2018.
- Y Nir Kshetri, "Blockchain's roles in meeting key supply chain management objectives," International Journal of Information Management, Elsevier, 80-82., 2018.
- Alexander Savelyev, "Copyright in the Blockchain era: Promises and challenges," Computer Law & Security Review, Elsevier, 2018.
- J.H. H, Otgonchimeg S., and Seo K., "Advanced metering infrastructure design and test bed experiment using intelligent agents: focusing on the PLC network base technology for Smart Grid system," The Journal of Supercomputing, 72(5), 1862-1877, 2018.
- Nir Kshetri, "Blockchain's roles in strengthening cybersecurity and protecting privacy," Telecommunications Policy, pp 20-23, 2017.
- S-K Kim, U-M Kim, J-H Huh, "A Study on Improvement of Blockchain Application to Overcome Vulnerability of IoT Multiplatform Security," Energies, MDPI, Vol.12, No.3, pp.1-29, 2019.
- J-H Huh and K Seo, "A Typeface Searching Technique Using Evaluation Functions for Shapes and Positions of Alphabets Used in Ancient Books for Image Searching," International Journal of Hybrid Information Technology, SERSC, Vol.9, No.9, pp. 283-292, 2016.
- Richard B. Levin, Peter Waltz, and Holly LaCount, "Betting Blockchain Will Change Everything - SEC and CFTC Regulation of Blockchain Technology, Handbook of Blockchain," Digital Finance, and Inclusion, Elsevier, Vol. 2, 187-212, 2017.
- J-H Huh, "Server Operation and Virtualization to Save Energy and Cost in Future Sustainable Computing," Sustainability, MDPI, Vol.10, No.6, pp.1-20, 2018. https://doi.org/10.3390/su10020001
- Christoph Prybila, Stefan Schulte, Christoph Hochreiner, and Ingo Webe, "Runtime verification for business processes utilizing the Bitcoin Blockchain," Future Generation Computer Systems, Elsevier, 2017.
- S-K Kim and J-H Huh, "A Study on the Improvement of Smart Grid Security Performance and Blockchain Smart Grid Perspective," Energies, MDPI, Vol.11, No.7, pp.1-22, 2018.
- Yan Chen, "Blockchain tokens and the potential democratization of entrepreneurship and innovation," SSRN, pp.12-13, 2017.
- Bogner, A., Chanson, M., & Meeuw, A., "A decentralised sharing app running a smart contract on the ethereum blockchain," In Proceedings of the 6th International Conference on the Internet of Things, pp. 177-178. ACM, 2016.
- Casino, F., Dasaklis, T. K., & Patsakis, C., "A systematic literature review of blockchain-based applications: current status, classification and open issues." Elsevier, Telematics and Informatics, 2018.
- Gatteschi, V., Lamberti, F., Demartini, C., Pranteda, C., & Santamaría, V., "To blockchain or not to blockchain: That is the question," IT Professional, 20(2), 62-74, 2018. https://doi.org/10.1109/MITP.2018.021921652
- Guo, Y., & Liang, C., "Blockchain application and outlook in the banking industry," Financial Innovation, 2(1), 24, 2016. https://doi.org/10.1186/s40854-016-0034-9
- J. H Huh, Koh, T, Seo, K., "Design of a shipboard outside communication network and the test bed using PLC: for the Workers' safety management during shipbuilding process," In Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication (p. 1-6). ACM, 2016.
- Herian, R., "Regulating disruption: Blockchain, Gdpr, and questions of data sovereignty," Journal of Internet Law, 22(2), 1, 2018.
- Andoni, M., et al., "Blockchain technology in the energy sector: A systematic review of challenges and opportunities," Renewable and Sustainable Energy Reviews, Elsevier, 100, 143-174 2019. https://doi.org/10.1016/j.rser.2018.10.014
- J.H Huh., T Koh., and K Seo, "NMEA2000 ship area network design and test bed experiment using power line communication with the 3-phase 3-line delta connection method," International Journal of Applied Engineering Research, Research India Publications, 10(11), 27789-27797, 2015.
- Schwerin, S., "Blockchain and privacy protection in the case of the european general data protection regulation (GDPR): a delphi study," The Journal of the British Blockchain Association, 1(1), 3554, 2018. https://doi.org/10.31585/jbba-1-1-(4)2018
- J-H Huh and K Seo, "RUDP design and implementation using OPNET simulation," Computer science and its applications. Springer, 913-919, 2015.
- J. Park et al., "Design of the real-time mobile push system for implementation of the shipboard smart working," In Advances in Computer Science and Ubiquitous Computing, Springer, 541-548, 2015.
- Fabiano, N., "The Internet of Things ecosystem: The blockchain and privacy issues. The challenge for a global privacy standard," In 2017 IEEE International Conference on Internet of Things for the Global Community (IoTGC), pp. 1-7, 2017.