Integrating Wi-Fi Deployment with BlockChain Technology for Accessibility and Security Optimization

被引:0
作者
Ladrido, John Martin [1 ]
Torrizo, Lorwin Felimar [1 ]
Materum, Lawrence [1 ]
机构
[1] De La Salle Univ, Elect & Commun Engn Dept, 2401 Taft Ave, Manila, Philippines
来源
LECTURE NOTES IN ELECTRICAL, ELECTRONIC AND COMPUTER ENGINEERING | 2019年
关键词
Access Point; Authentication; BlockChain; Hotspot; Security; Smart Contracts; Wi-Fi; WiFi;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
There are currently 4 billion people around the world who are using the Internet while two-thirds of the world's population has a mobile phone. By 2021, it is projected that 63% of total Internet traffic will come from mobile and wireless devices. Currently when it comes to area network coverage, cellular data or LTE is the technology that is being utilized when it comes to wireless traffic. However, LTE is over utilized such that its current data rates are not enough for consumers. On the other hand, Wi-Fi is limited to the access point area coverage, thus it is not really a feasible replacement for cellular technology when it comes to network coverage. This paper proposes a new type of deployment of Wi-Fi using BlockChain Technology. This method will increase the accessibility of Wi-Fi users using BlockChain Technology and at the same time, addressing the security and authentication problems encountered in traditional Wi-Fi Technology. The current Wi-Fi Technology is composed of 2 major components which are; an access point and authentication mechanism. Authentication mechanism has many variants, but the Authentication Server could only be deployed either on-premise or the cloud-based which are both centralized. This paper proposes to utilize BlockChain Technology which is a decentralized system for authentication, thus increasing security as there is no single entity or monopoly in authority. Everyone that is part of the BlockChain will be checking for integrity. For accessibility, the proposal will be similar to offloading, data roaming or 802.11u, wherein the users will be able to connect to any access points that is part or connected to the BlockChain network.
引用
收藏
页码:1 / 9
页数:9
相关论文
共 50 条
  • [1] Naive Security in a Wi-Fi World
    Swanson, Colleen
    Urner, Ruth
    Lank, Edward
    TRUST MANAGEMENT IV, 2010, 321 : 32 - 47
  • [2] PUBLIC WI-FI NETWORKS IN THE GLOBAL ENVIRONMENT AND THEIR SECURITY
    Losonczi, Peter
    GLOBALIZATION AND ITS SOCIO-ECONOMIC CONSEQUENCES, 2018, : 2206 - 2213
  • [3] Security Analysis of SOHO Wi-Fi routers
    Romana, Sandeep
    Grandhi, Jyostna
    Eswari, P. R. Lakshmi
    2020 INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA 2020), 2020, : 72 - 77
  • [4] Security of Wi-Fi as a Key Factor for IoT
    Zidkova, Nikola
    Maryska, Milos
    Nedomova, Lea
    Doucek, Petr
    HRADEC ECONOMIC DAYS 2020, VOL 10, PT 1, 2020, 10 : 906 - 914
  • [5] The Security of the WI-FI Networks in University Environment
    Losonczi, Peter
    Vackova, Martina
    Necas, Pavel
    DILEMAS CONTEMPORANEOS-EDUCACION POLITICA Y VALORES, 2019, 7 (01):
  • [6] Capacity aware Wi-Fi networks deployment
    Sammour, Ibrahim
    Chalhoub, Gerard
    De Sousa, Gil
    ANNALS OF TELECOMMUNICATIONS, 2024, 79 (5-6) : 361 - 379
  • [7] Utilising Fuzzy Logic to Improve Wi-Fi Security
    Naqvi, Ali
    2013 ELEVENTH INTERNATIONAL CONFERENCE ON ICT AND KNOWLEDGE ENGINEERING (ICT&KE), 2013,
  • [8] Wireless Security - An Approach Towards Secured Wi-Fi Connectivity
    Pimple, Nishant
    Pawar, Utkarsha
    Salunke, Tejashree
    Sangoi, Janhavi
    2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 872 - 876
  • [9] The Application of Wi-Fi Technology in Apparel Marketing
    Qu, Ying
    Ren, Jun
    TEXTILE BIOENGINEERING AND INFORMATICS SYMPOSIUM PROCEEDINGS, 2015, 2015, : 414 - 420
  • [10] Exploiting Statistical Mobility Models for Efficient Wi-Fi Deployment
    Wang, Tian
    Jia, Weijia
    Xing, Guoliang
    Li, Minming
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2013, 62 (01) : 360 - 373