Abstract
Due to the miniaturization, diversification, and massification of devices, the amount of installation of wireless AP (Access Point)s has increased, and the users can utilize the Internet by connecting their devices such as laptops, mobile phones, and tablet PCs to wireless APs when desired. However, there has been a big concern about the threat to steal user’s personal information from the devices connected to the wireless APs. People think this can be prevented by using the encrypted channel of the wireless AP, but the passwords of the wireless APs used in coffee shops, restaurants, or public places are null or a shared-single, so that the malicious user can also obtain such a password and the user’s personal information may be easily exposed. In this paper, we propose a protection scheme for user’s personal information delivered within the domain of a wireless AP and we introduce a method using a POS (Point of Sale) system for the scheme. A random SSID and password are generated through the POS system, and a user’s dedicated AP is generated based on this. Users can register their SSID and password with the device to protect them from the threat of personal information leakage by malicious users.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Qualcomm: The Wi-Fi Evolution an integral part of the wireless landscape. https://www.qualcomm.com/media/documents/files/the-wi-fi-evolution-an-integral-part-of-the-wireless-landscape.pdf
Telecom Advisory Services: The Economic Value of Wi-Fi: a Global View (2018 and 2023), October 2018. https://www.wifi.org/download.php?file=/sites/default/files/private/Economic%20Value%20of%20Wi-Fi%202018.pdf
Rojone: Wireless CPE, Access Points, Adapters Wireless Networking Tutorial. https://www.rojone.com/assets/files/L-Com-03-Wireless-CPE-Access-Points-Adapters.pdf
ABI Research: Global Wi-Fi Hotspots will Grow to 7.1 Million in 2015 as a Method to Offload Traffic. https://www.abiresearch.com/press/global-wi-fi-hotspots-will-grow-to-71-million-in-2/. Accessed July 2019
Tomić, V., Stojanović, D.: Trends and innovations in mobile banking (2018). https://www.researchgate.net/publication/330468035_Trends_and_innovations_in_mobile_banking
Ganapati, S.: Using Mobile Apps in Government, Washington DC: IBM Center for the Business of Government (2015). http://www.businessofgovernment.org/sites/default/files/Using%20Mobile%20Apps%20in%20Government.pdf
Maimon, D., Becker, M., Patil, S., Katz, J.: Self-protective behaviors over public WiFi networks. In: The Workshop: Learning from Authoritative Security Experiment Results, pp. 69–76 (2017). https://www.usenix.org/system/files/conference/laser2017/laser2017_maimon.pdf
Public WiFi: The Hidden Dangers of Public WiFi (2014). https://www.privatewifi.com/wp-content/uploads/2015/01/PWF_whitepaper_v6.pdf
Muppavarapu, R.: Open Wi-Fi hotspots-Threats and Mitigations (2014). https://dl.packetstormsecurity.net/papers/wireless/openwifimitigations.pdf
Norton: The risks of public Wi-Fi. https://us.norton.com/internetsecurity-privacy-risks-of-public-wi-fi.html. Accessed July 2019
Shahin, E.: Is WiFi worth it: the hidden dangers of public WiFi. Catholic Univ. J. Law Technol. 25(1), 7 (2017). https://scholarship.law.edu/cgi/viewcontent.cgi?article=1023&context=jlt
Sombatruang, N., Sasse, M.A., Baddeley, M.: Why do people use unsecure public Wi-Fi?: an investigation of behaviour and factors driving decisions. In: Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust. ACM (2016). https://www.researchgate.net/publication/319694418_Why_do_people_use_unsecure_public_Wi-Fi_An_investigation_of_behaviour_and_factors_driving_decisions
Kalniņš, R., Puriņš, J., Alksnis, G.: Security evaluation of wireless network access points. Appl. Comput. Syst. 21(1), 38–45 (2017). https://www.degruyter.com/downloadpdf/j/acss.2017.21.issue-1/acss-2017-0005/acss-2017-0005.pdf
Zou, Y., Zhu, J., Wang, X., Hanzo, L.: A survey on wireless security: technical challenges, recent advances, and future trends. Proc. IEEE 104(9), 1727–1765 (2016). https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7467419
Alblwi, S., Shujaee, K.: A survey on wireless security protocol WPA2. In: Proceedings of the International Conference on Security and Management (SAM). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp) (2017). https://csce.ucmss.com/cr/books/2017/LFS/CSREA2017/SAM3445.pdf
Xia, L., Kumar, S., Yang, X., Gopalakrishnan, P., Liu, Y., Schoenberg, S., Guo, X.: Virtual WiFi: bring virtualization from wired to wireless. In: ACM SIGPLAN Notices, vol. 46, no. 7, pp. 181–192. ACM, March 2011. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.362.2789&rep=rep1&type=pdf
Lee, N.S., Lee, J.H., Jeong, C.K.: PS-Net: personalized secure Wi-Fi networks. J. Korean Inst. Commun. Inf. Sci. 40(3), 497–505 (2015). http://www.koreascience.or.kr/article/JAKO201510665813311.page
Chandra, R., Bahl, P.: MultiNet: connecting to multiple IEEE 802.11 networks using a single wireless card. In: IEEE INFOCOM 2004, vol. 2, pp. 882–893. IEEE, March 2004. https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1356976
Acknowledgments
This research was supported by the MSIT (Ministry of Science and ICT), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2019-2015-0-00403) supervised by the IITP (Institute for Information & communications Technology Planning & Evaluation) and the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (NRF-2018R1A4A1025632).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Kim, M., Yim, K. (2020). Individually Separated Wireless Access Point to Protect User’s Private Information. In: Barolli, L., Hellinckx, P., Enokido, T. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2019. Lecture Notes in Networks and Systems, vol 97. Springer, Cham. https://doi.org/10.1007/978-3-030-33506-9_53
Download citation
DOI: https://doi.org/10.1007/978-3-030-33506-9_53
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-33505-2
Online ISBN: 978-3-030-33506-9
eBook Packages: EngineeringEngineering (R0)