Loading

A Novel Method for the Enhancement of Wi-Fi Security Software System
Sumisha Samuel1, Arul Treesa Mathew2, Amritha. S. Pillai3, Diege David4, Sneha Susan Thomas5, Sruthy Chandran6

1Amritha S Pillai, Computer Science and Engineering, Providence College of Engineering, Chengannur, India.
2Diege David, Computer Science and Engineering, Providence College of Engineering, Chengannur, India.
3Sneha Susan Thomas, Computer Science and Engineering, Providence College of Engineering, Chengannur, India.
4Sruthy Chandran, Computer Science and Engineering, Providence College of Engineering, Chengannur, India.
5Arul Treesa Mathew, Computer Science and Engineering, Providence College of Engineering, Chengannur, India.
6Sumisha Samuel, Computer Science and Engineering, Providence College of Engineering, Chengannur, India.
Manuscript received on July 20, 2019. | Revised Manuscript received on August 10, 2019. | Manuscript published on August 30, 2019. | PP: 905-909 | Volume-8 Issue-6, August 2019. | Retrieval Number: F8225088619/2019©BEIESP | DOI: 10.35940/ijeat.F8225.088619
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This paper proposes a novel method for enhancing current Wi-Fi security software system analyzing user’s wireless access behavior. The system secures the user from security hazards during the pre-connection, connection, and after- connection phases. The system can analyze and plot the Wi-Fi environment. The methods of fog computing and sending fake traffic are employed to protect PSK from sniffing. In the post connection phase, it identifies De-auth attack in real time and footmarks the attacker. The software functionalities are implemented and all the malicious entities are displayed on the User Interface (UI). The experimental results have shown that the system has better performance when compared with current systems. The system can be used for the security of Wi-Fi users.
Keywords: De-auth attack, Fog Computing, PSK.