Abstract
This paper describes some of the attacker utilize to disrupt wireless networks through MAC address, and then perform the simple protection through Traffic Protocol Authentication Module (TPAM). This module perform Challenge-Respond based on the hash part of MAC by using the hashing operation, this challenge will occur between the administrator, and the group of the customers through wireless network, and then generate and captured MAC address for all computers connect to wireless network detection unspecified MAC address, filtering it from the MAC address spooling according to protocol programmed by Visual Java#.Net. At the first stage the generation of MAC addresses must capture by many wireless networks tools such as AirJack, FakeAp and Wellenreiter, through analysis the traces. Then the programmer identifies the techniques which can be employed the used the capability to detect the anomaly MAC address, which also the user must alert the administrator of the wireless networks, or alert the others his/her friends in same workgroup. Wireless access points have large scale of the security problems, one of them are the suffering the unauthorized access and use. So the administrator or the wireless network should deal with his/her others groups to the specified generation of MAC address, and then registered the newest of the overall MAC address of the wireless network.
Highlights
Every company is responsible for ensuring that every manufactured unit gets a unique address within its assigned range of addresses
The first 3-bytes from the left of address are used to identify the manufacturer of the Network Interface Card (NIC)
The serial Erasable Programmable Read Only Memory (EEPROM) is programmed directly from the Ethernet controller, so that the Media Access Control address (MAC) address and other configuration information can be entered via personal computer (PC) software
Summary
Each computer attached to an Ethernet is assigned a unique 48-bit (6 bytes) integer. Every company is responsible for ensuring that every manufactured unit gets a unique address within its assigned range of addresses. No two cards will purposely have the same address [4]. The construction of the MAC address consists from. The first 3-bytes from the left of address are used to identify the manufacturer of the Network Interface Card (NIC). The last 3-bytes of address are the unique serial number.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: AL-Rafidain Journal of Computer Sciences and Mathematics
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.