DOI QR코드

DOI QR Code

Survey of Algorithms and Techniques Used to Improve the Security of A Public Wi-Fi Network

  • Aloufi, Hanouf (Department of Computer Science, College of Computer and Information Systems, Umm Al-Qura University) ;
  • Alsuwat, Hatim (Department of Computer Science, College of Computer and Information Systems, Umm Al-Qura University)
  • Received : 2022.06.05
  • Published : 2022.06.30

Abstract

The use of public Wi-Fi has increased in recent years with many people like to spend their time outside in malls or café shops which provide public Wi-Fi for their customers. However, since the public Wi-Fi can be accessed from any device the security of public Wi-Fi plays a big role to prevent the stealing of information by an attacker with methods and techniques such as WPA, WPA2 and WPA3. However, it is well known to the attackers that these methods are not difficult to get hacked by the attacker device to take the client precious information. Some researches were done in increasing the security of public Wi-Fi each with their own different technique or algorithm to provide more secure connection to the public Wi-Fi and prevent any unauthorized user to connect to avoid stealing the data of another legal user. Theses research paper are evaluated to learn which method excel in protecting the public Wi-Fi security by giving an analysis to the methods provided by the research paper with comparing the pros and cons of each algorithm. Moreover, the research displays that there are methods to actually provide security to the public Wi-Fi with each being very different in implementation.

Keywords

References

  1. Smyrnova-Trybulska, E., 2017. NETWORKING IS ONE OF THE EFFECTIVENESS FORM OF THE INTERNATIONAL RESEARCH. SOME ASPECTS. OPEN EDUCATIONAL E-ENVIRONMENT OF MODERN UNIVERSITY, (3), pp.130-139.
  2. Kumar, B. and Deepa, B., 2015. Computer Networking: A Survey. International Journal of Trend in Research and Development, 2(5).
  3. PADOLE, M., KANANI, P., RAUT, L., JHAVERI, D. and NAGDA, M., 2017. An Insight into IP Addressing. ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 10(1).
  4. Pahlavan, K. and Krishnamurthy, P., 2009. Networking fundamentals. Chichester: Wiley.
  5. Lugovic, S., Mrsic, L. and Korona, L., 2019. Public WiFi Security Network Protocol Practices in Tourist Destination. Springer Nature Switzerland, pp.321-332,.
  6. Choi, H., Carpenter, D. and Ko, M., 2021. Risk Taking Behaviors Using Public Wi-FiTM. Information Systems Frontiers.
  7. Shadeed Al-Mejibli, I. and Rasheed Alharbe, D., 2020. ANALYZING AND EVALUATING THE SECURITY STANDARDS IN WIRELESS NETWORK: A REVIEW STUDY. Iraqi Journal for Computers and Informatics, 46(1), pp.32-39. https://doi.org/10.25195/ijci.v46i1.248
  8. Qadir, A. and Varo, N., 2019. A Review Paper on Cryptography. Institute of Electrical and Electronics Engineers,.
  9. Fong, K. and Wong, S., 2015. Hong Kong Wi-Fi Adoption and Security Survey 2014. Computer and Information Science, 8(1).
  10. Sharma, A., Bhatia, T., Katyar, A. and U, a., 2021. Wireless Security - An Introduction to Wireless Security Protocols and their Security Flaws. Annals of R.S.C., 25(6), pp.11805 - 11812.
  11. Ezra, P., Misra, S., Agrawal, A., Oluranti, J., Maskeliunas, R. and Damasevicius, R., 2022. Secured Communication Using Virtual Private Network (VPN). Springer Nature Singapore,.
  12. Maimon, D., Howell, C., Jacques, S. and Perkins, R., 2021. Situational Awareness and Public Wi-Fi Users' Self-Protective Behaviors. open qualitative criminology.
  13. Ivanov, N., Lou, J. and Yan, Q., 2020. SmartWiFi: Universal and Secure Smart Contract-Enabled WiFi Hotspot. Springer Nature Switzerland,.
  14. He, X., Alqahtani, S., Gamble, R. and Papa, M., 2019. Securing Over-The-Air IoT Firmware Updates using Blockchain. Association for Computing Machinery,.
  15. Brincat, A., Lombardo, A., Morabito, G. and Quattropani, S., 2019. On the use of Blockchain technologies in WiFi networks. Computer Networks, 162, p.106855. https://doi.org/10.1016/j.comnet.2019.07.011
  16. Fox, P., 2021. TrustedAP: Using the Ethereum Blockchain to Mitigate the Evil Twin Attack. 2021 Association for Computing Machinery,.
  17. SONG, X., SONG, L. and HE, R., 2017. A Data Encryption Transmission Scheme Based on WiFi. DEStech Transactions on Computer Science and Engineering, (cnsce).
  18. Aljawarneh, S., Masadeh, S. and Alkhateeb, F., 2010. A secure wifi system for wireless networks: an experimental evaluation. Network Security, 2010(6), pp.6-12. https://doi.org/10.1016/S1353-4858(10)70081-7
  19. Forutan, V. and Fischer, R., 2015. Security-Enhanced Network Coding Through Public-Key Cryptography. Institute of Electrical and Electronics Engineers,.
  20. Belghazi, Z., Benamar, N., Addaim, A. and Kerrache, C., 2019. Secure WiFi-Direct Using Key Exchange for IoT Device-to-Device Communications in a Smart Environment. Future Internet, 11(12), p.251. https://doi.org/10.3390/fi11120251
  21. Xiong, J. and Jamieson, K., 2013. SecureArray: Improving WiFi Security with Fine-Grained Physical-Layer Informatio. Association for Computing Machinery,.
  22. Aminanto, M. and Kim, K., 2017. Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach. Springer International Publishing,.
  23. A. Reyes, A., D. Vaca, F., Castro Aguayo, G., Niyaz, Q. and Devabhaktuni, V., 2020. A Machine Learning Based Two-Stage Wi-Fi Network Intrusion Detection System. Electronics, 9(10), p.1689. https://doi.org/10.3390/electronics9101689
  24. Dai, H., Shi, W., Zhou, Z. and Jiang, J., 2020. Authentication Method for WiFi Connection of Devices Based on Channel State Information. Institute of Electrical and Electronics Engineers,.
  25. Zhang, J., Li, M., Tang, Z., Gong, X., Wang, W., Fang, D. and Wang, Z., 2018. Defeat Your Enemy Hiding behind Public WiFi: WiGuard Can Protect Your Sensitive Information from CSI-Based Attack. Applied Sciences, 8(4), p.515. https://doi.org/10.3390/app8040515
  26. Tao, L. and Yudong, W., 2018. WIFI Security Certification Through Device Information. Institute of Electrical and Electronics Engineers,.
  27. Williams, C., 2007. SECURING WIRELESS LOCAL AREA NETWORKS USING SMART-CARD-BASED DIGITAL CERTIFICATES FROM THE DOD PUBLIC KEY INFRASTRUCTURE. Institute of Electrical and Electronics Engineers,.