##plugins.themes.bootstrap3.article.main##

  •   Sanjay Tiwari

  •   Tanuj Tiwari

  •   Tanya Tiwari

Abstract

Wi-Fi an acronym for wireless fidelity is a wireless networking technology that allows computers and other devices to communicate over a wireless high speed Internet and utilizes one of the IEEE 802.11 wireless standards to achieve a wireless connection to a network. Every device has a unique MAC Address used for identifying devices connected over Wi-Fi.  Since virtually every device now in the market is Wi-Fi capable, MAC address can be considered as a universal identifier. This paper proposes innovative approach to use the MAC Address as an authentication method.

Keywords: MAC address, Wi-Fi, Bluetooth

References

W. Lemstra ,‎ V. Hayes,‎ J. Groenewegen The Innovation Journey of Wi-Fi: The Road to Global Success , Cambridge University Press,2010

B. Ballmann “ Wifi Fun.†In: Understanding Network Hacks. Springer, Berlin, Heidelberg, 2015

B.Alotaibi, K. Elleithy “ A New MAC Address Spoofing Detection Technique Based on Random Forestsâ€. Reindl LM, ed. Sensors (Basel, Switzerland). ;16(3):281, 2016 . doi:10.3390/s16030281.

A.Holt.,C.Y.Huang,“802.11 Wireless Networks: Security and Analysis†Springer; 2010

S.S. Ahammed ,B.C. Pillai, Design of Wi-Fi Based Mobile Electrocardiogram Monitoring System on Concerto Platform Engineering, Volume, Pages 65-73, 2013

Bin Yu., Lisheng Xu., Yongxu Li, 2012“Bluetooth Low Energy (BLE) Based Mobile Electrocardiogram Monitoring Systemâ€, Proceeding of the IEEE International Conference on Information and Automation Shenyang, China.

Rolf Nilsson and Bill Saltzstein, “Wireless Low Energy Technology Makes New Medical applications Possible†,2011

Kolias, C.; Kambourakis, G.; Stavrou, A.; Gritzalis, S. Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset. IEEE Commun. Surveys Tutor., 99, 184–208, 2015.

B. Bloessl,C. Sommer, F. Dressler and D. Eckho The scrambler attack: A robust physical layer attack on location privacy in vehicular networks. In ICNC , 2015 .

V.Brik., S. Banerjee, M. S. Gruteser, S. Oh “ Wireless device identi_cation with radiometric signatures. In MobiCom†2008,.

P.O. Carlos, J.Bernardos, J.Carlos and Z.U. Niga, “Wi-Fi internet connectivity and privacy: hiding your tracks on the wireless internetâ€. In IEEE CSCN 2015.

Mohammed Abbas Fadhil Al-Husainy MAC Address as a Key for Data Encryption International Journal of Computer Science and Information Security, Vol. XXX, No. XXX, 2013

P.M. Jonker ,W. Preface , “Special issue on secure data management,†Journal of Computer Security, 17(1),pp.1-3, 2009.

M.Lei, Z. Qi, X. Hong, and S. V. Vrbsky, “Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks,†in Proc. of the 2007 Intelligence and Security Informatics (ISI’07), New Brunswick, New Jersey,USA. IEEE, May 2007,

B. Danev ,D. Zanetti,S. Capkun. On physical-layer identication of wireless devices. ACM Computing Surveys (CSUR), 45(1):6,2012.

Downloads

Download data is not yet available.

##plugins.themes.bootstrap3.article.details##

How to Cite
[1]
Tiwari, S., Tiwari, T. and Tiwari, T. 2018. A secured MAC address based Login System. European Journal of Electrical Engineering and Computer Science. 2, 2 (Feb. 2018). DOI:https://doi.org/10.24018/ejece.2018.2.2.16.