Skip to main content

Individually Separated Wireless Access Point to Protect User’s Private Information

  • Conference paper
  • First Online:
  • 1089 Accesses

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 97))

Abstract

Due to the miniaturization, diversification, and massification of devices, the amount of installation of wireless AP (Access Point)s has increased, and the users can utilize the Internet by connecting their devices such as laptops, mobile phones, and tablet PCs to wireless APs when desired. However, there has been a big concern about the threat to steal user’s personal information from the devices connected to the wireless APs. People think this can be prevented by using the encrypted channel of the wireless AP, but the passwords of the wireless APs used in coffee shops, restaurants, or public places are null or a shared-single, so that the malicious user can also obtain such a password and the user’s personal information may be easily exposed. In this paper, we propose a protection scheme for user’s personal information delivered within the domain of a wireless AP and we introduce a method using a POS (Point of Sale) system for the scheme. A random SSID and password are generated through the POS system, and a user’s dedicated AP is generated based on this. Users can register their SSID and password with the device to protect them from the threat of personal information leakage by malicious users.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Qualcomm: The Wi-Fi Evolution an integral part of the wireless landscape. https://www.qualcomm.com/media/documents/files/the-wi-fi-evolution-an-integral-part-of-the-wireless-landscape.pdf

  2. Telecom Advisory Services: The Economic Value of Wi-Fi: a Global View (2018 and 2023), October 2018. https://www.wifi.org/download.php?file=/sites/default/files/private/Economic%20Value%20of%20Wi-Fi%202018.pdf

  3. Rojone: Wireless CPE, Access Points, Adapters Wireless Networking Tutorial. https://www.rojone.com/assets/files/L-Com-03-Wireless-CPE-Access-Points-Adapters.pdf

  4. ABI Research: Global Wi-Fi Hotspots will Grow to 7.1 Million in 2015 as a Method to Offload Traffic. https://www.abiresearch.com/press/global-wi-fi-hotspots-will-grow-to-71-million-in-2/. Accessed July 2019

  5. Tomić, V., Stojanović, D.: Trends and innovations in mobile banking (2018). https://www.researchgate.net/publication/330468035_Trends_and_innovations_in_mobile_banking

  6. Ganapati, S.: Using Mobile Apps in Government, Washington DC: IBM Center for the Business of Government (2015). http://www.businessofgovernment.org/sites/default/files/Using%20Mobile%20Apps%20in%20Government.pdf

  7. Maimon, D., Becker, M., Patil, S., Katz, J.: Self-protective behaviors over public WiFi networks. In: The Workshop: Learning from Authoritative Security Experiment Results, pp. 69–76 (2017). https://www.usenix.org/system/files/conference/laser2017/laser2017_maimon.pdf

  8. Public WiFi: The Hidden Dangers of Public WiFi (2014). https://www.privatewifi.com/wp-content/uploads/2015/01/PWF_whitepaper_v6.pdf

  9. Muppavarapu, R.: Open Wi-Fi hotspots-Threats and Mitigations (2014). https://dl.packetstormsecurity.net/papers/wireless/openwifimitigations.pdf

  10. Norton: The risks of public Wi-Fi. https://us.norton.com/internetsecurity-privacy-risks-of-public-wi-fi.html. Accessed July 2019

  11. Shahin, E.: Is WiFi worth it: the hidden dangers of public WiFi. Catholic Univ. J. Law Technol. 25(1), 7 (2017). https://scholarship.law.edu/cgi/viewcontent.cgi?article=1023&context=jlt

  12. Sombatruang, N., Sasse, M.A., Baddeley, M.: Why do people use unsecure public Wi-Fi?: an investigation of behaviour and factors driving decisions. In: Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust. ACM (2016). https://www.researchgate.net/publication/319694418_Why_do_people_use_unsecure_public_Wi-Fi_An_investigation_of_behaviour_and_factors_driving_decisions

  13. Kalniņš, R., Puriņš, J., Alksnis, G.: Security evaluation of wireless network access points. Appl. Comput. Syst. 21(1), 38–45 (2017). https://www.degruyter.com/downloadpdf/j/acss.2017.21.issue-1/acss-2017-0005/acss-2017-0005.pdf

    Article  Google Scholar 

  14. Zou, Y., Zhu, J., Wang, X., Hanzo, L.: A survey on wireless security: technical challenges, recent advances, and future trends. Proc. IEEE 104(9), 1727–1765 (2016). https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7467419

    Article  Google Scholar 

  15. Alblwi, S., Shujaee, K.: A survey on wireless security protocol WPA2. In: Proceedings of the International Conference on Security and Management (SAM). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp) (2017). https://csce.ucmss.com/cr/books/2017/LFS/CSREA2017/SAM3445.pdf

  16. Xia, L., Kumar, S., Yang, X., Gopalakrishnan, P., Liu, Y., Schoenberg, S., Guo, X.: Virtual WiFi: bring virtualization from wired to wireless. In: ACM SIGPLAN Notices, vol. 46, no. 7, pp. 181–192. ACM, March 2011. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.362.2789&rep=rep1&type=pdf

  17. Lee, N.S., Lee, J.H., Jeong, C.K.: PS-Net: personalized secure Wi-Fi networks. J. Korean Inst. Commun. Inf. Sci. 40(3), 497–505 (2015). http://www.koreascience.or.kr/article/JAKO201510665813311.page

    Article  Google Scholar 

  18. Chandra, R., Bahl, P.: MultiNet: connecting to multiple IEEE 802.11 networks using a single wireless card. In: IEEE INFOCOM 2004, vol. 2, pp. 882–893. IEEE, March 2004. https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1356976

Download references

Acknowledgments

This research was supported by the MSIT (Ministry of Science and ICT), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2019-2015-0-00403) supervised by the IITP (Institute for Information & communications Technology Planning & Evaluation) and the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (NRF-2018R1A4A1025632).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Myoungsu Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kim, M., Yim, K. (2020). Individually Separated Wireless Access Point to Protect User’s Private Information. In: Barolli, L., Hellinckx, P., Enokido, T. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2019. Lecture Notes in Networks and Systems, vol 97. Springer, Cham. https://doi.org/10.1007/978-3-030-33506-9_53

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-33506-9_53

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-33505-2

  • Online ISBN: 978-3-030-33506-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics