References
- Smyrnova-Trybulska, E., 2017. NETWORKING IS ONE OF THE EFFECTIVENESS FORM OF THE INTERNATIONAL RESEARCH. SOME ASPECTS. OPEN EDUCATIONAL E-ENVIRONMENT OF MODERN UNIVERSITY, (3), pp.130-139.
- Kumar, B. and Deepa, B., 2015. Computer Networking: A Survey. International Journal of Trend in Research and Development, 2(5).
- PADOLE, M., KANANI, P., RAUT, L., JHAVERI, D. and NAGDA, M., 2017. An Insight into IP Addressing. ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 10(1).
- Pahlavan, K. and Krishnamurthy, P., 2009. Networking fundamentals. Chichester: Wiley.
- Lugovic, S., Mrsic, L. and Korona, L., 2019. Public WiFi Security Network Protocol Practices in Tourist Destination. Springer Nature Switzerland, pp.321-332,.
- Choi, H., Carpenter, D. and Ko, M., 2021. Risk Taking Behaviors Using Public Wi-FiTM. Information Systems Frontiers.
- Shadeed Al-Mejibli, I. and Rasheed Alharbe, D., 2020. ANALYZING AND EVALUATING THE SECURITY STANDARDS IN WIRELESS NETWORK: A REVIEW STUDY. Iraqi Journal for Computers and Informatics, 46(1), pp.32-39. https://doi.org/10.25195/ijci.v46i1.248
- Qadir, A. and Varo, N., 2019. A Review Paper on Cryptography. Institute of Electrical and Electronics Engineers,.
- Fong, K. and Wong, S., 2015. Hong Kong Wi-Fi Adoption and Security Survey 2014. Computer and Information Science, 8(1).
- Sharma, A., Bhatia, T., Katyar, A. and U, a., 2021. Wireless Security - An Introduction to Wireless Security Protocols and their Security Flaws. Annals of R.S.C., 25(6), pp.11805 - 11812.
- Ezra, P., Misra, S., Agrawal, A., Oluranti, J., Maskeliunas, R. and Damasevicius, R., 2022. Secured Communication Using Virtual Private Network (VPN). Springer Nature Singapore,.
- Maimon, D., Howell, C., Jacques, S. and Perkins, R., 2021. Situational Awareness and Public Wi-Fi Users' Self-Protective Behaviors. open qualitative criminology.
- Ivanov, N., Lou, J. and Yan, Q., 2020. SmartWiFi: Universal and Secure Smart Contract-Enabled WiFi Hotspot. Springer Nature Switzerland,.
- He, X., Alqahtani, S., Gamble, R. and Papa, M., 2019. Securing Over-The-Air IoT Firmware Updates using Blockchain. Association for Computing Machinery,.
- Brincat, A., Lombardo, A., Morabito, G. and Quattropani, S., 2019. On the use of Blockchain technologies in WiFi networks. Computer Networks, 162, p.106855. https://doi.org/10.1016/j.comnet.2019.07.011
- Fox, P., 2021. TrustedAP: Using the Ethereum Blockchain to Mitigate the Evil Twin Attack. 2021 Association for Computing Machinery,.
- SONG, X., SONG, L. and HE, R., 2017. A Data Encryption Transmission Scheme Based on WiFi. DEStech Transactions on Computer Science and Engineering, (cnsce).
- Aljawarneh, S., Masadeh, S. and Alkhateeb, F., 2010. A secure wifi system for wireless networks: an experimental evaluation. Network Security, 2010(6), pp.6-12. https://doi.org/10.1016/S1353-4858(10)70081-7
- Forutan, V. and Fischer, R., 2015. Security-Enhanced Network Coding Through Public-Key Cryptography. Institute of Electrical and Electronics Engineers,.
- Belghazi, Z., Benamar, N., Addaim, A. and Kerrache, C., 2019. Secure WiFi-Direct Using Key Exchange for IoT Device-to-Device Communications in a Smart Environment. Future Internet, 11(12), p.251. https://doi.org/10.3390/fi11120251
- Xiong, J. and Jamieson, K., 2013. SecureArray: Improving WiFi Security with Fine-Grained Physical-Layer Informatio. Association for Computing Machinery,.
- Aminanto, M. and Kim, K., 2017. Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach. Springer International Publishing,.
- A. Reyes, A., D. Vaca, F., Castro Aguayo, G., Niyaz, Q. and Devabhaktuni, V., 2020. A Machine Learning Based Two-Stage Wi-Fi Network Intrusion Detection System. Electronics, 9(10), p.1689. https://doi.org/10.3390/electronics9101689
- Dai, H., Shi, W., Zhou, Z. and Jiang, J., 2020. Authentication Method for WiFi Connection of Devices Based on Channel State Information. Institute of Electrical and Electronics Engineers,.
- Zhang, J., Li, M., Tang, Z., Gong, X., Wang, W., Fang, D. and Wang, Z., 2018. Defeat Your Enemy Hiding behind Public WiFi: WiGuard Can Protect Your Sensitive Information from CSI-Based Attack. Applied Sciences, 8(4), p.515. https://doi.org/10.3390/app8040515
- Tao, L. and Yudong, W., 2018. WIFI Security Certification Through Device Information. Institute of Electrical and Electronics Engineers,.
- Williams, C., 2007. SECURING WIRELESS LOCAL AREA NETWORKS USING SMART-CARD-BASED DIGITAL CERTIFICATES FROM THE DOD PUBLIC KEY INFRASTRUCTURE. Institute of Electrical and Electronics Engineers,.