0% found this document useful (0 votes)
102 views

A Review of IP and MAC Address Filtering in Wireless Network Security

Uploaded by

suguna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
102 views

A Review of IP and MAC Address Filtering in Wireless Network Security

Uploaded by

suguna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/319292293

A Review of IP and MAC Address Filtering in Wireless Network Security

Article · August 2017

CITATIONS READS

8 3,212

5 authors, including:

Ressy Dwitias Sari Supiyandi Supiyandi


Universitas Pembangunan Panca Budi Universitas Pembangunan Panca Budi
3 PUBLICATIONS   9 CITATIONS    14 PUBLICATIONS   60 CITATIONS   

SEE PROFILE SEE PROFILE

Andysah Putera Utama Siahaan Muhammad Muttaqin S.Kom


Universitas Pembangunan Panca Budi universitas pembangunan panca budi, medan
330 PUBLICATIONS   1,624 CITATIONS    2 PUBLICATIONS   8 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Dining Philosophers Theory and Concept in Operating System Scheduling View project

Heuristic Function Influence to the Global Optimum Value in Shortest Path Problem View project

All content following this page was uploaded by Muhammad Muttaqin S.Kom on 28 August 2017.

The user has requested enhancement of the downloaded file.


© 2017 IJSRST | Volume 3 | Issue 6 | Print ISSN: 2395-6011 | Online ISSN: 2395-602X
Themed Section: Science and Technology

A Review of IP and MAC Address Filtering in Wireless Network Security


Ressy Dwitias Sari1, Supiyandi2, Andysah Putera Utama Siahaan3, Muhammad Muttaqin4,
Raheliya Br. Ginting5
1,2,3,4
Faculty of Computer Science, Universitas Pembanguan Panca Budi, Medan, Indonesia
5
Department of Informatics, Politeknik Poliprofesi Medan, Medan, Indonesia
3
Ph.D. Student of School of Computer and Communication Engineering, Universiti Malysia Perlis, Kangar, Malaysia

ABSTRACT

Technological developments in computer networks increasingly demand security on systems built. Security also
requires flexibility, efficiency, and effectiveness. The exchange of information through the internet connection is a
common thing to do now. However, this way can be able to trigger data theft or cyber crime which resulted in losses
for both parties. Data theft rate is getting higher by using a wireless network. The wireless system does not have any
signal restrictions that can be intercepted Filtering is used to restrict incoming access through the internet. It aims to
avoid intruders or people who want to steal data. This is fatal if not anticipated. IP and MAC filtering is a way to
protect wireless networks from being used and misused by just anyone. This technique is very useful for securing
data on the computer if it joins the public network. By registering IP and MAC on a router, this will keep the
information unused and stolen. This system is only a few computers that can be connected to a wireless hotspot by
IP and MAC Address listed.
Keywords : Wireless Security, IP, MAC Address, Filtering
I. INTRODUCTION infiltrated intruders can be detected via a connected
MAC Address, but the weakness of the person's
Currently, wireless networks are increasingly being used existence can not be found as easily as imagined [4]. It is
in homes, schools, universities, and offices. It is a reason why wireless network security is needed.
supported by the ease and convenience of its use since it Unlike wired networks, wireless signal coverage range
does not need to use cable. Installing a network using a can not be determined in absolute terms. The stronger
cable on a LAN will be very inconvenient. Wireless the signal, the easier the computer can be connected.
networks are vulnerable to attacks and interference from However, this is very dangerous. The more distance a
outside parties while on a network that uses cables, this router reaches, the more people can connect to it.
can be overcome by checking the cable connection
whether there is a violation of the rules or not. It is II. METHODS AND MATERIAL
because wireless networks use radio signals as a medium
of information delivery. Therefore, the main factor to be 2.1 Wireless Network
considered is the security issue so that the signal can not
be taken over by the irresponsible person. Wireless technology enables one or more equipment to
communicate without using a cable. This connection
Wireless network is a network that uses electromagnetic requires only certain signals and frequencies to connect.
waves as a transmitter. Because of strong waves, every Air mediates the transmission of information with the
client can connect with this router's emission. Wifi help of waves emitted from the router [3]. There are
Access Point is a tool that can connect to it. The most many types of data transmission wirelessly. For example,
common problem is to find out where the intruder is Infra Red, Bluetooth, WiFi, Radio are types of data
trying to connect to the wireless network. In the cable transmission equipment. Wifi networks do not use
network, the connected computer can easily be known cables as connected devices, but it still has a topology. It
by checking the position of the LAN cable on the hub. illustrates how wireless devices interact on the physical
Stealth cables can be easily found if there is any layer of the OSI model. At the Physical layer, the 802.11
suspicion in the network. On a wireless network, the wireless-based network uses spectrum communications

IJSRST1736110 | 12 August 2017 | Accepted: 26 August 2017 | July-August-2017 [(3)6 : 470-473]


470
spreading sequentially at 2.4 GHz, and the devices  IP Class A. The first 8 bits are the network ID, and
communicate with each other using two basic topologies: the next 24 bits are the host ID, class A network has
adhoc and infrastructure. particularly Id from 0 to 127.
 IP Class B .The first 16 bits are network Id, and the
2.2 Wireless Threat next 16 bits are host Id, class B has network id from
128 to 191
Wireless technology enables one or more equipment to  IP Class C. The first 24 bits are network Id, and the
communicate without any cable. There are several kinds next 8 bits are host Id, class C has network id from
of security threats that can be occurred when connected 192 to 223
to the internet [3]. All of this represents potential threats  IP Class D. It is used for multicasting, ie the use of
in wireless networks as well. However, the main concern applications together by multiple computers, and IP
on wireless communication is the data, malicious that can be used is 224.0.0.0 - 239.255.255.255
software, malicious codes, theft and industrial and  IP Class E. It has a range of 240.0.0.0 -
foreign espionage [5][6]. Theft can happen on wireless 254.255.255.255, this IP is used for experiments
equipment because it has been taken. Eligible and prepared for future IP address usage.
unauthorized system users can commit embezzlement
and theft. It is easier to steal since the interceptor knows The IP Address function is like a home address. Each
the resources has a system security weakness. The address has city, district, street, number and zip code.
people who do the interception is a cracker. They are There can not be a house that has the same address
who enter the system without rights, usually for personal combination. So is the IP Address. IP address has an
retribution or for committing a crime. Crackers are from important role in communicating on computer networks.
outside and inside the organization. The data packet delivery error will never occur if the IP
Address is configured properly.
Many software can damage the system by injecting it to
a server. The crackers can get access to wireless network 2.4 MAC Address
access points by eavesdropping on wireless equipment
communications. Malicious code includes viruses, MAC Address is a special number on every computer
worms, Trojan Horses, logic bombs, or other unwanted network card, switch, router, access point, or all that can
software designed to damage files or weakens the be connected with other devices in the network
system [7][8]. Theft of service occurs when users are not mechanism. It allows devices in the network to
entitled to access to networks and use network resources. communicate with each other [1]. In an Ethernet-based
Many data are stolen when such virus has been inside network, each header in the Ethernet frame contains
the mainframe. It is, especially in government and information about the MAC address of the source and
military office. In wireless networks, the stealing is MAC addresses of the destination computer. If a
performed by eavesdropping in radio transmissions. computer has more than one network card, then the
Ensuring confidentiality, integrity, authenticity, and computer must also have MAC Address respectively.
availability is the ultimate goal of the security policies of Each laptop currently has two MAC Address, the wired
all governments. network card (RJ-45), and wireless network card
(802.11b).
2.3 IP Address
III. RESULTS AND DISCUSSION
IP Address is the address or digital identity given to a
computer device so that the computer can communicate 3.1 IP and MAC Address Filtering
with other computers. Of course, to get the IP Address,
the computer must have a network card [2]. IP Address On a multiple-client network, an IP setting mechanism is
consists of 4 blocks of decimal numbers whose value necessary since it is used to prevent the monopoly of
has a range between 0 to 255. Distribution of IP Address bandwidth usage so that all clients can get their
consists of five classes, such as: respective bandwidth quota. Wireless networks have

International Journal of Scientific Research in Science and Technology (www.ijsrst.com)


471
three standard security services to avoid any threats to
the network.

 Authentication. It is to provide security services to


ensure the identity of the client's communicating
location. It provides network control by denying
access to client stations that can not authenticate
correctly.
 Confidentiality. It is to provide "the privacy gained
on cable networks." The intention is to prevent
leakage of information by eavesdropping.
 Integrity. It is to ensure that messages are not
changed while sending between wireless clients and
access points in active attacks.

IP and MAC Filtering is always owned by the router to


allow users to configure their network freely. This is
done to keep everyone from entering indiscriminately to
modify settings. The disadvantage of this is the MAC
address is very easy dispoofing or even changed. Tools
ifconfig on Linux / Unix OS or various tools such as Figure 1. TP-LINK ZXV10 W300S IP/MAC Filtering
network utilitis, regedit, smac, machange on Windows
OS are some examples of applications that can modify Figure 1 describes the menu contained on the TP-LINK
MAC Address. For common protection, MAC Address ZXV10 W300S router. IP Address can be registered in
is a great choice, but to keep big company data like detail in this section which can pass access to which
government and military, MAC Address is not a good router can not. The port number specifies the options
choice. In wireless networks, MAC address duplication when it wants to block access to certain ports. In
does not result in conflict. addition to IP Address, MAC Address can also be
blocked access. There are three parts to this menu, IP /
3.2 Filtering Advantages MAC Set Editing, IP / MAC Rule Editing and IP / MAC
Listing Filter.
Each router has been facilitated by IP and MAC
Filtering menu. It aims to provide convenience in the IP and MAC Address filter serve to help administrators
distribution of internet bandwidth. Activities on the to prevent and control users who are entitled to enter
client can be controlled in full to ensure that the their system, especially to the wireless router. Only
activities performed by the client do not violate the rules wireless devices are trusted or have registered MAC
that have been set. addresses that may gain access to the wireless router.

IV. CONCLUSION

IP Address and MAC Filter are the essential security


tool for avoiding the data theft. From the above
discussion, it can be concluded that wireless technology
has the advantage that the user does not have to bother
with the affairs of wiring to make the network more
efficient and effective. However, it also has a negative
impact; This is to make it easier for data thieves to
commit crimes without knowing where they are. IP and

International Journal of Scientific Research in Science and Technology (www.ijsrst.com)


472
MAC security can be done to minimize wireless crimes.
Giving a password or access code to the router can help
reduce data theft on the network system. Security on
wireless networks can be anticipated from various things.
However, it all depends on how a network administrator
manages it. Things that need to be avoided is to provide
additional access to the unauthorized person.

V. REFERENCES

[1]. Wikipedia, "MAC address," 6 July 2017. [Online].


Available:
https://id.wikipedia.org/wiki/MAC_address.
[Accessed 22 August 2017].
[2]. O. XL, "What is IP Address ? DNS And
Subnetting?," [Online]. Available:
http://www.open0xl.com/domain-ping. [Accessed
21 August 2017].
[3]. A. Lubis and A. P. U. S. , "Network Forensic
Application in General Cases," IOSR Journal of
Computer Engineering, vol. 18, no. 6, pp. 41-44,
2016.
[4]. A. K. Singh and B. Mishra, "WLAN Security:
Active Attack of WLAN Secure Network (Identity
theft)," International Journal of Computer Science
Issues, vol. 3, no. 1, pp. 555-559, 2011.
[5]. S. Nixon and Y. Haile, "Analyzing Vulnerabilities
on WLAN Security Protocols and Enhance its
Security by using Pseudo Random MAC
Address," International Journal of Emerging
Trends & Technology in Computer Science, vol.
6, no. 3, pp. 293-300, 2017.
[6]. A. R. Vaidya and S. Jaiswal, "Secure and Flexible
Communication Technique: Implementation
Using MAC Filter in WLAN and MANET for IP
Spoofing Detection," International Journal of
Computer Networks and Wireless
Communications, vol. 3, no. 4, pp. 519-525, 2016.
[7]. H. A. A., V. G. A. and H. A. P., "Media Access
Control Spoofing Techniques and its Counter
Measures," International Journal of Scientific &
Engineering Research, vol. 2, no. 6, pp. 1-5, 2012.
[8]. M. Izhar and V. R. Singh, "Network Security
Vulnerabilities: Malicious Nodes attack,"
International Journal of Scientific and Research
Publications, vol. 4, no. 7, pp. 1-5, 2014.

International Journal of Scientific Research in Science and Technology (www.ijsrst.com)


473

View publication stats

You might also like