A Review of Setting up a Secured Web Based Wireless Hotspot

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)
  
© 2014 by IJETT Journal
Volume-16 Number-5
Year of Publication : 2014
Authors : Chukwuemeka Odi Agwu , Ifeanyi Isaiah Achi
  10.14445/22315381/IJETT-V16P245

Citation 

Chukwuemeka Odi Agwu , Ifeanyi Isaiah Achi. "A Review of Setting up a Secured Web Based Wireless Hotspot", International Journal of Engineering Trends and Technology (IJETT), V16(5),208-215 Oct 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

The increasing desire and preference in recent times for wireless connectivity by individuals, firms, ministries has made it very important for network administrators to put into considerations the best measure to securing wireless network[2]. Corporate Organization are embracing the wireless hotspot technology for increased productivity and provision of a more flexible work arrangement for workers so as to work closely with their partners with the ability to access limitless volume of data anytime, anywhere. However, securing wireless network is the greatest challenge faced by network administrator [9] and as such there is need for constant research for a better security measure that will improve the existing security measures. Therefore a web based wireless authentication secured hotspot is one of the security measures we shall lay emphasis on in this work. Other researchers on this subject[7],[8],highlighted some other means of authenticating wireless network without emphasis on this web based authentication as mean means of securing wireless network. It is the wireless network security that will require the users to be authenticated or allowed access using the browsers login page. This paper centers on the technicality of setting up this web based secured wireless hotspot; configuring the server (router) and programming the authentication web page. The server runs on Linux operating system and the web pages were designed using HTML/Java/PhP script, using mysql for the data base that manages the radius server. My focus here is on the setting up of the wireless hotspot radius server that can work with the designed web authentication pages and not the actual design of the web pages.

References

[1] B. Mitchell, “Service Set Identifier (SSID)”, http://compnetworking.about.com/cs/wireless/g/bldef_ssid.htm, 2014.
[2] K. Sanka, S. Sundaralingam, A. Balinsky, and D. Miller “Cisco Wireless LAN Security”,Cisco system inc, 2005.
[3] M. Kaafar, K. Salamatian, L. Mathy, T. Turletti, C. Barakat and W. Dabbous, “Securing Internet Coordinate Embedding Systems”, In Proceedings of ACM SIGCOMM, 2007.
[4] P. Barford, “Measurement as a First Class Network Citizen”, White Paper, 2005.
[5] G. Karame, D. Gubler, and S. Capkun, “On the Security of Bottleneck Bandwidth Estimation Techniques”, In Proceedings of SecureComm, 2009.
[6] J. Edney, and A. Arbaugh, “Real 802.11 security wi-fi protected Access and 802.11i”, Pearson Education inc, 2004.
[7] A. Arbaugh, and A, Williams, “Wireless LAN Security Measures” Pearson Education inc,2004.
[8] G. De, and S. Gert, “Network Security Fundamentals” Cisco System Inc, 2005.
[9] T. Maufer, “A Field Guide to Wireless Lans: For Administrators and Power Users” Pearson Education inc, 2004.
[10] M. Bradley, “802.11 Wireless Lan Fundamental”, Cisco Press, 2004.
[11] Cisco, “Configuring Authentication”, Cisco UCS Manager GUI Configuration Guide, 2014. www.cisco.com
[12] S. Wilkins, “Routing Protocol Authentication Concepts and Configuration”, 2011. www.ciscopress.com
[13] D. Keller, “Installing and Operating a RADIUS Server”, 2004. www.wifi.keller.com/CNIT107HW7.html
[14] C. Schroder, “Authenticating Wi-Fi Users with FreeRadius”, Openlogic, 2011. http://www.openlogic.com
[15] C. Adam, and F. Glenn, “The Wireless Networking Starter Kit: The Practical Guide to Wi-Fi Networks starter kits”, 2003.
[16] E. Blanchard, “Introduction to Data Communications”, 2005.
[17] R. Banerjee, “Internetworking Technologies”, An Engineering Perspective, (2002).
[18] H. Davis, and R. Mansfield, “The Wi-Fi Experience: Everyone`s Guide to 802.11b Wireless Networking”, 2001.
[19] J. Bola, “Wireless LANs Demystified”, 2002.
[20] J. Bates, “Wireless Broadband Handbook”, 2001.
[21] M. Ciampa, “CWNA Guide to Wireless LANs (Networking) Second Edition”,2005.
[22] R. Scotland, “Unsecure or Secure: The Network Security Challenge for Small and Mid-size Businesses”, 2013.

Keywords
Wireless Hotspot, Radius Server, Linux, Security, Radius Client, Authentication, Browser, Web Administration.