Design of Unique Auto Disconnect Password Generation for Public Wi - Fi Routers
Journal Title: International Journal of Scientific Research and Management - Year 2017, Vol 5, Issue 6
Abstract
WI - FI has emerged as the single most popula r wireless network protocol of the 21st century. While other wireless protocols work better in certain situations, WI - FI technology is used in many organizations and in other public places which often provide free access to wireless internet hotspots. Wi - F i networks are prone to virus attacks. Wi - Fi Protected Setup (WPS) contains a design error that could allow a weaker - than - expected defense against brute - force attacks, which could allow an attacker to gain unauthorized access to the affected system. Do no te that brute - force attack is a programme that hackers often use to crack and stealthily enter into an encrypted and password protected system. Usually, users in India opt the WPS method to set up a wireless router for home network. In th is method, the sta ndard requires a PIN to be used during the setup phase. By design this method is susceptible to brute force attacks against the PIN, said the agency in an advisory issued with high severity ratings. An unauthenticated, remote attacker within range of the w ireless point could use the PIN to gain unauthorized to the device to retrieve the password for the wireless network or change the configuration of the device. It also said that some WPS devices in the c ountry do not implement any kind of lockout policy f or brute - force attempts, which greatly reduces the time to perform a successful attack. Hence to avoid such circumstances, in this paper, we are implementing unique (one time password) key generation method. Each OTP assigned with fixed sessions. During t hose sessions it is allowed to access an internet until session ends. Once if session expires, it gets disconnect automatically. Hence enhancing security in Public Wi - Fi and provides an open option for researchers to implement various applications in such technologies
Authors and Affiliations
Mr. T. M. Hayath
Design and Implementation of HINSPELL - Hindi Spell Checker using Hybrid approach
A spell checker is an application program that flags words in a document that may not be spelled correctly. A spell checker is a basic need of a word processor of any language. Spell checker analyzes the written text i...
Application of Graph Theory in Transportation Networks
When trying to estimate the maximum number of people who can fly from a city C i to a city C j through different routes and airports, one can use a networks N as a model. Let us assume the source s, as the origin C i of...
Experimental Study of Critical Rainfall of the Aizi Gully Baihetan Hydropower Station Near - Z one Area
At dawn of 28 June 2012, a catastrophic debris flow occurred in Aizi gully near Baihetan hydropower station, resulting in 40 people dead or missing. In addition, the debris flow blocked the main transporta...
Generic Lossless Visible Watermarking
F or generic visible watermarking with a capability of lossless image recovery , a novel method is proposed. This method is based on the deterministic one - to - one compound mappings of image pixel values for coveri...
Seblang Ritual Performance of "Using Society" In Banyuwangi Regency
Ritual Seblang derived from pre - Hindu culture, dance form with trance / unconscious synonymous with offering something to disa village. Using public dipercayaoleh Seblang ritual function of sacred and profane. Seblang...