A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
net/publication/319292293
CITATIONS READS
8 3,212
5 authors, including:
Some of the authors of this publication are also working on these related projects:
Dining Philosophers Theory and Concept in Operating System Scheduling View project
Heuristic Function Influence to the Global Optimum Value in Shortest Path Problem View project
All content following this page was uploaded by Muhammad Muttaqin S.Kom on 28 August 2017.
ABSTRACT
Technological developments in computer networks increasingly demand security on systems built. Security also
requires flexibility, efficiency, and effectiveness. The exchange of information through the internet connection is a
common thing to do now. However, this way can be able to trigger data theft or cyber crime which resulted in losses
for both parties. Data theft rate is getting higher by using a wireless network. The wireless system does not have any
signal restrictions that can be intercepted Filtering is used to restrict incoming access through the internet. It aims to
avoid intruders or people who want to steal data. This is fatal if not anticipated. IP and MAC filtering is a way to
protect wireless networks from being used and misused by just anyone. This technique is very useful for securing
data on the computer if it joins the public network. By registering IP and MAC on a router, this will keep the
information unused and stolen. This system is only a few computers that can be connected to a wireless hotspot by
IP and MAC Address listed.
Keywords : Wireless Security, IP, MAC Address, Filtering
I. INTRODUCTION infiltrated intruders can be detected via a connected
MAC Address, but the weakness of the person's
Currently, wireless networks are increasingly being used existence can not be found as easily as imagined [4]. It is
in homes, schools, universities, and offices. It is a reason why wireless network security is needed.
supported by the ease and convenience of its use since it Unlike wired networks, wireless signal coverage range
does not need to use cable. Installing a network using a can not be determined in absolute terms. The stronger
cable on a LAN will be very inconvenient. Wireless the signal, the easier the computer can be connected.
networks are vulnerable to attacks and interference from However, this is very dangerous. The more distance a
outside parties while on a network that uses cables, this router reaches, the more people can connect to it.
can be overcome by checking the cable connection
whether there is a violation of the rules or not. It is II. METHODS AND MATERIAL
because wireless networks use radio signals as a medium
of information delivery. Therefore, the main factor to be 2.1 Wireless Network
considered is the security issue so that the signal can not
be taken over by the irresponsible person. Wireless technology enables one or more equipment to
communicate without using a cable. This connection
Wireless network is a network that uses electromagnetic requires only certain signals and frequencies to connect.
waves as a transmitter. Because of strong waves, every Air mediates the transmission of information with the
client can connect with this router's emission. Wifi help of waves emitted from the router [3]. There are
Access Point is a tool that can connect to it. The most many types of data transmission wirelessly. For example,
common problem is to find out where the intruder is Infra Red, Bluetooth, WiFi, Radio are types of data
trying to connect to the wireless network. In the cable transmission equipment. Wifi networks do not use
network, the connected computer can easily be known cables as connected devices, but it still has a topology. It
by checking the position of the LAN cable on the hub. illustrates how wireless devices interact on the physical
Stealth cables can be easily found if there is any layer of the OSI model. At the Physical layer, the 802.11
suspicion in the network. On a wireless network, the wireless-based network uses spectrum communications
IV. CONCLUSION
V. REFERENCES