International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 129

Research Paper | Information Technology | Kenya | Volume 4 Issue 3, March 2015


An Enhanced and Dynamic Network Hardware Devices Security Using MAC Address

Emmilly Mbichi Mwangi


Abstract: Network hardware devices are currently becoming very expensive due to high market demand. As a result, they are at a great risk of theft. Securing or recovering a stolen or lost device is a great challenge in the modern world. Every networked computer device has a Network Interface Card (NIC). An NIC has a unique identifier code prominently known as the (media access control) MAC address that uniquely identifies the device under use over the network. It is therefore possible to use a MAC address as a security measure for devices that can operate within a network. Using a database system, users (network security managers) can identify the computer owners using their computer MAC and in case of a reported theft occurrence, it is possible to identify and locate the device. This work therefore, specifically focuses on how to track lost network devices that are still under operation using their MAC addresses.


Keywords: MAC, address, NIC and network


Edition: Volume 4 Issue 3, March 2015,


Pages: 349 - 351


How to Cite this Article?

Emmilly Mbichi Mwangi, "An Enhanced and Dynamic Network Hardware Devices Security Using MAC Address", International Journal of Science and Research (IJSR), Volume 4 Issue 3, March 2015, pp. 349-351, https://www.ijsr.net/get_abstract.php?paper_id=SUB151940

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'MAC'

Downloads: 0

Research Paper, Information Technology, India, Volume 10 Issue 10, October 2021

Pages: 1313 - 1318

Automation in Daily Life & It's Impact on Individuals & Society

Hemant Gautam Bodhare

Share this Article

Downloads: 0

Masters Thesis, Information Technology, Zimbabwe, Volume 11 Issue 2, February 2022

Pages: 133 - 136

A Comparative Model for Predicting Customer Churn using Supervised Machine Learning

Muchatibaya Adrin | David Fadaralika

Share this Article


Top