A Review of IP and MAC Address Filtering in Wireless Network Security

Authors

  • Ressy Dwitias Sari  Faculty of Computer Science, Universitas Pembanguan Panca Budi, Medan, Indonesia
  • Supiyandi  Faculty of Computer Science, Universitas Pembanguan Panca Budi, Medan, Indonesia
  • Andysah Putera Utama Siahaan  Ph.D. Student of School of Computer and Communication Engineering, Universiti Malysia Perlis, Kangar, Malaysia
  • Muhammad Muttaqin  Faculty of Computer Science, Universitas Pembanguan Panca Budi, Medan, Indonesia
  • Raheliya Br. Ginting  Department of Informatics, Politeknik Poliprofesi Medan, Medan, Indonesia

Keywords:

Wireless Security, IP, MAC Address, Filtering

Abstract

Technological developments in computer networks increasingly demand security on systems built. Security also requires flexibility, efficiency, and effectiveness. The exchange of information through the internet connection is a common thing to do now. However, this way can be able to trigger data theft or cyber crime which resulted in losses for both parties. Data theft rate is getting higher by using a wireless network. The wireless system does not have any signal restrictions that can be intercepted Filtering is used to restrict incoming access through the internet. It aims to avoid intruders or people who want to steal data. This is fatal if not anticipated. IP and MAC filtering is a way to protect wireless networks from being used and misused by just anyone. This technique is very useful for securing data on the computer if it joins the public network. By registering IP and MAC on a router, this will keep the information unused and stolen. This system is only a few computers that can be connected to a wireless hotspot by IP and MAC Address listed.

References

  1. Wikipedia, "MAC address," 6 July 2017. [Online]. Available: https://id.wikipedia.org/wiki/MAC_address. [Accessed 22 August 2017].
  2. O. XL, "What is IP Address ? DNS And Subnetting?," [Online]. Available: http://www.open0xl.com/domain-ping. [Accessed 21 August 2017].
  3. A. Lubis and A. P. U. S. , "Network Forensic Application in General Cases," IOSR Journal of Computer Engineering, vol. 18, no. 6, pp. 41-44, 2016.
  4. A. K. Singh and B. Mishra, "WLAN Security: Active Attack of WLAN Secure Network (Identity theft)," International Journal of Computer Science Issues, vol. 3, no. 1, pp. 555-559, 2011.
  5. S. Nixon and Y. Haile, "Analyzing Vulnerabilities on WLAN Security Protocols and Enhance its Security by using Pseudo Random MAC Address," International Journal of Emerging Trends & Technology in Computer Science, vol. 6, no. 3, pp. 293-300, 2017.
  6. A. R. Vaidya and S. Jaiswal, "Secure and Flexible Communication Technique: Implementation Using MAC Filter in WLAN and MANET for IP Spoofing Detection," International Journal of Computer Networks and Wireless Communications, vol. 3, no. 4, pp. 519-525, 2016.
  7. H. A. A., V. G. A. and H. A. P., "Media Access Control Spoofing Techniques and its Counter Measures," International Journal of Scientific & Engineering Research, vol. 2, no. 6, pp. 1-5, 2012.
  8. M. Izhar and V. R. Singh, "Network Security Vulnerabilities: Malicious Nodes attack," International Journal of Scientific and Research Publications, vol. 4, no. 7, pp. 1-5, 2014.

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
Ressy Dwitias Sari, Supiyandi, Andysah Putera Utama Siahaan, Muhammad Muttaqin, Raheliya Br. Ginting, " A Review of IP and MAC Address Filtering in Wireless Network Security, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 3, Issue 6, pp.470-473, July-August-2017.