International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 129 | Views: 176

Research Paper | Information Technology | Kenya | Volume 4 Issue 3, March 2015


An Enhanced and Dynamic Network Hardware Devices Security Using MAC Address

Emmilly Mbichi Mwangi


Abstract: Network hardware devices are currently becoming very expensive due to high market demand. As a result, they are at a great risk of theft. Securing or recovering a stolen or lost device is a great challenge in the modern world. Every networked computer device has a Network Interface Card (NIC). An NIC has a unique identifier code prominently known as the (media access control) MAC address that uniquely identifies the device under use over the network. It is therefore possible to use a MAC address as a security measure for devices that can operate within a network. Using a database system, users (network security managers) can identify the computer owners using their computer MAC and in case of a reported theft occurrence, it is possible to identify and locate the device. This work therefore, specifically focuses on how to track lost network devices that are still under operation using their MAC addresses.


Keywords: MAC, address, NIC and network


Edition: Volume 4 Issue 3, March 2015,


Pages: 349 - 351


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top