Providing Location Based Security to an Unencrypted WiFi Network

نویسندگان

  • Anders Nylander
  • Henry Andersson
  • Alexey Vinel
چکیده

For this project, we investigate different methods of adding locationbased security to a WLAN network. A literature review is done to confirm the current state-of-the-art on the subject, and we scrutinize the available methods based on practicality, security, and simplicity. We then further delve into a few specific methods with good properties based on the prior review, to confirm if these are suitable for a proof-of-principle implementation. Finally, if a suitable method is found, we develop the proof-of-principle to show that the system can work in practice. iii [ June 2017 at 7:53 – classicthesis version 1.0 ] [ June 2017 at 7:53 – classicthesis version 1.0 ] A C K N O W L E D G E M E N T S Thanks to Bengt Eriksson, Magnus Porsgaard and Omid Manikhi of HMS Industrial Networks (HMS) for lending technical assistance. Professor Alexey Vinel for academic support and guidance. v [ June 2017 at 7:53 – classicthesis version 1.0 ] [ June 2017 at 7:53 – classicthesis version 1.0 ]

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

WiFi Miner: An Online Apriori-Infrequent Based Wireless Intrusion Detection System

Intrusion detection in wireless networks has become a vital part in wireless network security systems with wide spread use of Wireless Local Area Networks (WLAN). Currently, almost all devices are Wi-Fi (Wireless Fidelity) capable and can access WLAN. This paper proposes an Intrusion Detection System, WiFi Miner, which applies an infrequent pattern association rule mining Apriori technique to w...

متن کامل

An Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation

Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...

متن کامل

Hong Kong Wi-Fi Adoption and Security Survey 2014

WiFi connectivity is a necessity as most of the mobile devices nowadays are coming with built-in WiFi adaptors. WiFi enables your electronic gadgets to ‘talk’ to other gadgets and to control and being controlled by other gadgets via Internet without complicated cabling systems. You can use your mobile phone to talk, to download, to control your TV, home security camera or even to open the door ...

متن کامل

Mobile Network Threat Analysis and MNO Positioning

The dramatic increase of smart mobile devices and applications, the advent of Android OS, the increased number of wireless radios (incl. NFC) the support and the low awareness about security and privacy risks on the one hand, and the flatter, IP-based network architecture, the introduction of new radio technologies (femtocells, WiFi, LTE) and applications (M2M, NFC) on the other, have changed t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017