An Enhanced and Dynamic Network Hardware Devices Security Using MAC Address
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 129

Research Paper | Information Technology | Kenya | Volume 4 Issue 3, March 2015

An Enhanced and Dynamic Network Hardware Devices Security Using MAC Address

Emmilly Mbichi Mwangi

Network hardware devices are currently becoming very expensive due to high market demand. As a result, they are at a great risk of theft. Securing or recovering a stolen or lost device is a great challenge in the modern world. Every networked computer device has a Network Interface Card (NIC). An NIC has a unique identifier code prominently known as the (media access control) MAC address that uniquely identifies the device under use over the network. It is therefore possible to use a MAC address as a security measure for devices that can operate within a network. Using a database system, users (network security managers) can identify the computer owners using their computer MAC and in case of a reported theft occurrence, it is possible to identify and locate the device. This work therefore, specifically focuses on how to track lost network devices that are still under operation using their MAC addresses.

Keywords: MAC, address, NIC and network

Edition: Volume 4 Issue 3, March 2015

Pages: 349 - 351

Share this Article

How to Cite this Article?

Emmilly Mbichi Mwangi, "An Enhanced and Dynamic Network Hardware Devices Security Using MAC Address", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB151940, Volume 4 Issue 3, March 2015, 349 - 351

Enter Your Email Address




Similar Articles with Keyword 'MAC'

Downloads: 88

Research Paper, Information Technology, United States of America, Volume 9 Issue 7, July 2020

Pages: 1087 - 1088

Modern Warehouse Operations Execution Using Mobile Devices

Dhanesh Thatikonda

Share this Article

Downloads: 103

Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1137 - 1140

A Literature Survey on Virtualization Security Threats in Cloud Computing

Brona Shah, Jignesh Vania

Share this Article

Downloads: 103

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1465 - 1469

PTP Method in Network Security for Misbehavior Detection Using Entropy

Neha Pathak, R. S. Apare

Share this Article

Downloads: 106

Research Paper, Information Technology, India, Volume 9 Issue 7, July 2020

Pages: 1906 - 1909

A Novel Technique for Fake News Detection using Machine Learning Algorithms and Web Scrapping

K S Veda, Sudarshana K, Moulya M, Amulya, Chandana N S

Share this Article

Downloads: 107

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1076 - 1079

Parallelizing Coherent Rule Mining Algorithm on CUDA

Aditya A. Davale, Shailendra W. Shende

Share this Article

Similar Articles with Keyword 'address'

Downloads: 59

Research Paper, Information Technology, India, Volume 9 Issue 12, December 2020

Pages: 1710 - 1711

E-Learning

Dr. Rajani D. Shionkar

Share this Article

Downloads: 86

Research Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1896 - 1909

Users Experience with E-Journal Features: A Research Survey of Aerospace Scientists and Engineers of Bangalore

R. Guruprasad, P. Marimuthu

Share this Article

Downloads: 88

Research Paper, Information Technology, Kenya, Volume 3 Issue 11, November 2014

Pages: 995 - 999

A Donor Information Needs Driven Approach to Address Kenyas Declining Blood Donations

Ireri Salome, Waiganjo Peter, Orwa Daniel

Share this Article

Downloads: 103

Research Paper, Information Technology, Kenya, Volume 3 Issue 9, September 2014

Pages: 1843 - 1851

Implementing a Web-based Routine Health Information System in Kenya: Factors Affecting Acceptance and Use

Josephine KARURI, Peter WAIGANJO, Daniel ORWA

Share this Article

Downloads: 107 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Research Paper, Information Technology, India, Volume 4 Issue 7, July 2015

Pages: 2400 - 2403

Secure Deduplication in Cloud Backup Services

Nidhi Panpaliya, Prachi Sorte

Share this Article



Top