Design of Unique Auto Disconnect Password Generation for Public Wi - Fi Routers
Journal Title: International Journal of Scientific Research and Management - Year 2017, Vol 5, Issue 6
Abstract
WI - FI has emerged as the single most popula r wireless network protocol of the 21st century. While other wireless protocols work better in certain situations, WI - FI technology is used in many organizations and in other public places which often provide free access to wireless internet hotspots. Wi - F i networks are prone to virus attacks. Wi - Fi Protected Setup (WPS) contains a design error that could allow a weaker - than - expected defense against brute - force attacks, which could allow an attacker to gain unauthorized access to the affected system. Do no te that brute - force attack is a programme that hackers often use to crack and stealthily enter into an encrypted and password protected system. Usually, users in India opt the WPS method to set up a wireless router for home network. In th is method, the sta ndard requires a PIN to be used during the setup phase. By design this method is susceptible to brute force attacks against the PIN, said the agency in an advisory issued with high severity ratings. An unauthenticated, remote attacker within range of the w ireless point could use the PIN to gain unauthorized to the device to retrieve the password for the wireless network or change the configuration of the device. It also said that some WPS devices in the c ountry do not implement any kind of lockout policy f or brute - force attempts, which greatly reduces the time to perform a successful attack. Hence to avoid such circumstances, in this paper, we are implementing unique (one time password) key generation method. Each OTP assigned with fixed sessions. During t hose sessions it is allowed to access an internet until session ends. Once if session expires, it gets disconnect automatically. Hence enhancing security in Public Wi - Fi and provides an open option for researchers to implement various applications in such technologies
Authors and Affiliations
Mr. T. M. Hayath
Determinants Affecting Consumer Behaviour With Regard To Counterfeit Products
ounterfeiting is the practice of manufacturing, importing/exporting, distributing, selling or otherwise dealing in goods, often of inferior quality, under a trademark that is identical to or sub...
SecureChild - Children Tracking Android Application ”
Android operating system is at the top in market because of its features like portability, platform independence, and low memory consumption. As android operating System is used in mobile pho...
Mechanical Properties of Chemically Treated Luffa Aegyptiaca Fiber Reinforced Epoxy Matrix Composites
In recent year natural fiber composite materi al place a major role in aerospace and automobile industries. Natural fibers such as flax, hemp, kenaf and jute are derived from renewable resources and cons...
Financial Inclusion In India
Financial Inclusion is the delivery of financial services to all the people in a fair, transparent and equitable manner at af fordable cost. Financial Inclusion has the potential to improve the standards of life of...
In ventory Periodic Review Model (n q, R, T) With Quadratic Backorder Costs
At each review, the quantity ordered is a multiple of Q, nQ and the reorder level is R. The backorder cost C B (t) is taken as a question function of t, the length of time of the backorder. C B (t) is b 1 +b 2 +b 3 t 3...