An Enhanced and Dynamic Network Hardware Devices Security Using MAC Address
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Information Technology | Kenya | Volume 4 Issue 3, March 2015

An Enhanced and Dynamic Network Hardware Devices Security Using MAC Address

Emmilly Mbichi Mwangi

Network hardware devices are currently becoming very expensive due to high market demand. As a result, they are at a great risk of theft. Securing or recovering a stolen or lost device is a great challenge in the modern world.Every networked computer device has a Network Interface Card (NIC). An NIC has a unique identifier code prominently known as the (media access control) MAC address that uniquely identifies the device under use over the network. It is therefore possible to use a MAC address as a security measure for devices that can operate within a network. Using a database system, users (network security managers) can identify the computer owners using their computer MAC and in case of a reported theft occurrence, it is possible to identify and locate the device. This work therefore, specifically focuses on how to track lost network devices that are still under operation using their MAC addresses.

Keywords: MAC, address, NIC and network

Edition: Volume 4 Issue 3, March 2015

Pages: 349 - 351

Share this Article

How to Cite this Article?

Emmilly Mbichi Mwangi, "An Enhanced and Dynamic Network Hardware Devices Security Using MAC Address", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB151940, Volume 4 Issue 3, March 2015, 349 - 351

87 PDF Views | 72 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'MAC'

Research Paper, Information Technology, United States of America, Volume 9 Issue 7, July 2020

Pages: 1087 - 1088

Modern Warehouse Operations Execution Using Mobile Devices

Dhanesh Thatikonda

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1465 - 1469

PTP Method in Network Security for Misbehavior Detection Using Entropy

Neha Pathak, R. S. Apare

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2077 - 2080

Image Embedding in QR Code

Swapnil Mahajan, Nisha Wankhade

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1137 - 1140

A Literature Survey on Virtualization Security Threats in Cloud Computing

Brona Shah, Jignesh Vania

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2049 - 2054

Securing TCP/IP Stacks Using IP Tables

Hamisu I. Usman, J. Dharani

Share this Article

Similar Articles with Keyword 'address'

Research Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1896 - 1909

User's Experience with E-Journal Features: A Research Survey of Aerospace Scientists and Engineers of Bangalore

R. Guruprasad, P. Marimuthu

Share this Article

Research Paper, Information Technology, Kenya, Volume 3 Issue 11, November 2014

Pages: 995 - 999

A Donor Information Needs Driven Approach to Address Kenya's Declining Blood Donations

Ireri Salome, Waiganjo Peter, Orwa Daniel

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 2037 - 2040

A Survey on Privacy Protection in Personalized Web Search

Khwaja Aamer, Dr. A.S Hiwale

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 5, May 2014

Pages: 1150 - 1154

A Review of Securing Home Using Video Surveillance

Priti Vasant Kale, Samidha Dwivedi Sharma

Share this Article

Research Paper, Information Technology, Kenya, Volume 3 Issue 9, September 2014

Pages: 1843 - 1851

Implementing a Web-based Routine Health Information System in Kenya: Factors Affecting Acceptance and Use

Josephine KARURI, Peter WAIGANJO, Daniel ORWA

Share this Article
Top