Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2022.22.6.28

Survey of Algorithms and Techniques Used to Improve the Security of A Public Wi-Fi Network  

Aloufi, Hanouf (Department of Computer Science, College of Computer and Information Systems, Umm Al-Qura University)
Alsuwat, Hatim (Department of Computer Science, College of Computer and Information Systems, Umm Al-Qura University)
Publication Information
International Journal of Computer Science & Network Security / v.22, no.6, 2022 , pp. 194-202 More about this Journal
Abstract
The use of public Wi-Fi has increased in recent years with many people like to spend their time outside in malls or café shops which provide public Wi-Fi for their customers. However, since the public Wi-Fi can be accessed from any device the security of public Wi-Fi plays a big role to prevent the stealing of information by an attacker with methods and techniques such as WPA, WPA2 and WPA3. However, it is well known to the attackers that these methods are not difficult to get hacked by the attacker device to take the client precious information. Some researches were done in increasing the security of public Wi-Fi each with their own different technique or algorithm to provide more secure connection to the public Wi-Fi and prevent any unauthorized user to connect to avoid stealing the data of another legal user. Theses research paper are evaluated to learn which method excel in protecting the public Wi-Fi security by giving an analysis to the methods provided by the research paper with comparing the pros and cons of each algorithm. Moreover, the research displays that there are methods to actually provide security to the public Wi-Fi with each being very different in implementation.
Keywords
Public Network; Wi-Fi; Security; Man in the middle attack; Cryptography; Survey;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 Aminanto, M. and Kim, K., 2017. Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach. Springer International Publishing,.
2 A. Reyes, A., D. Vaca, F., Castro Aguayo, G., Niyaz, Q. and Devabhaktuni, V., 2020. A Machine Learning Based Two-Stage Wi-Fi Network Intrusion Detection System. Electronics, 9(10), p.1689.   DOI
3 Zhang, J., Li, M., Tang, Z., Gong, X., Wang, W., Fang, D. and Wang, Z., 2018. Defeat Your Enemy Hiding behind Public WiFi: WiGuard Can Protect Your Sensitive Information from CSI-Based Attack. Applied Sciences, 8(4), p.515.   DOI
4 Tao, L. and Yudong, W., 2018. WIFI Security Certification Through Device Information. Institute of Electrical and Electronics Engineers,.
5 Aljawarneh, S., Masadeh, S. and Alkhateeb, F., 2010. A secure wifi system for wireless networks: an experimental evaluation. Network Security, 2010(6), pp.6-12.   DOI
6 Forutan, V. and Fischer, R., 2015. Security-Enhanced Network Coding Through Public-Key Cryptography. Institute of Electrical and Electronics Engineers,.
7 Belghazi, Z., Benamar, N., Addaim, A. and Kerrache, C., 2019. Secure WiFi-Direct Using Key Exchange for IoT Device-to-Device Communications in a Smart Environment. Future Internet, 11(12), p.251.   DOI
8 Xiong, J. and Jamieson, K., 2013. SecureArray: Improving WiFi Security with Fine-Grained Physical-Layer Informatio. Association for Computing Machinery,.
9 Kumar, B. and Deepa, B., 2015. Computer Networking: A Survey. International Journal of Trend in Research and Development, 2(5).
10 Williams, C., 2007. SECURING WIRELESS LOCAL AREA NETWORKS USING SMART-CARD-BASED DIGITAL CERTIFICATES FROM THE DOD PUBLIC KEY INFRASTRUCTURE. Institute of Electrical and Electronics Engineers,.
11 PADOLE, M., KANANI, P., RAUT, L., JHAVERI, D. and NAGDA, M., 2017. An Insight into IP Addressing. ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 10(1).
12 Pahlavan, K. and Krishnamurthy, P., 2009. Networking fundamentals. Chichester: Wiley.
13 Lugovic, S., Mrsic, L. and Korona, L., 2019. Public WiFi Security Network Protocol Practices in Tourist Destination. Springer Nature Switzerland, pp.321-332,.
14 Choi, H., Carpenter, D. and Ko, M., 2021. Risk Taking Behaviors Using Public Wi-FiTM. Information Systems Frontiers.
15 Qadir, A. and Varo, N., 2019. A Review Paper on Cryptography. Institute of Electrical and Electronics Engineers,.
16 Ivanov, N., Lou, J. and Yan, Q., 2020. SmartWiFi: Universal and Secure Smart Contract-Enabled WiFi Hotspot. Springer Nature Switzerland,.
17 Sharma, A., Bhatia, T., Katyar, A. and U, a., 2021. Wireless Security - An Introduction to Wireless Security Protocols and their Security Flaws. Annals of R.S.C., 25(6), pp.11805 - 11812.
18 Ezra, P., Misra, S., Agrawal, A., Oluranti, J., Maskeliunas, R. and Damasevicius, R., 2022. Secured Communication Using Virtual Private Network (VPN). Springer Nature Singapore,.
19 Maimon, D., Howell, C., Jacques, S. and Perkins, R., 2021. Situational Awareness and Public Wi-Fi Users' Self-Protective Behaviors. open qualitative criminology.
20 Fong, K. and Wong, S., 2015. Hong Kong Wi-Fi Adoption and Security Survey 2014. Computer and Information Science, 8(1).
21 Shadeed Al-Mejibli, I. and Rasheed Alharbe, D., 2020. ANALYZING AND EVALUATING THE SECURITY STANDARDS IN WIRELESS NETWORK: A REVIEW STUDY. Iraqi Journal for Computers and Informatics, 46(1), pp.32-39.   DOI
22 Smyrnova-Trybulska, E., 2017. NETWORKING IS ONE OF THE EFFECTIVENESS FORM OF THE INTERNATIONAL RESEARCH. SOME ASPECTS. OPEN EDUCATIONAL E-ENVIRONMENT OF MODERN UNIVERSITY, (3), pp.130-139.
23 Fox, P., 2021. TrustedAP: Using the Ethereum Blockchain to Mitigate the Evil Twin Attack. 2021 Association for Computing Machinery,.
24 SONG, X., SONG, L. and HE, R., 2017. A Data Encryption Transmission Scheme Based on WiFi. DEStech Transactions on Computer Science and Engineering, (cnsce).
25 Dai, H., Shi, W., Zhou, Z. and Jiang, J., 2020. Authentication Method for WiFi Connection of Devices Based on Channel State Information. Institute of Electrical and Electronics Engineers,.
26 He, X., Alqahtani, S., Gamble, R. and Papa, M., 2019. Securing Over-The-Air IoT Firmware Updates using Blockchain. Association for Computing Machinery,.
27 Brincat, A., Lombardo, A., Morabito, G. and Quattropani, S., 2019. On the use of Blockchain technologies in WiFi networks. Computer Networks, 162, p.106855.   DOI