Public Wifi Seminar Report (1)
Public Wifi Seminar Report (1)
Seminar Report
On
Navigating the Promise and Perils of Public Wi-Fi
Submitted in partial fulfillment of the requirement
For the award of the degree of
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING
Jawaharlal Nehru Technological University Hyderabad
Submitted By
Sunkari Abhiram(21E11A05O9)
Assistant Professor
CERTIFICATE
The satisfaction that accompanies the successful completion of the task would be put
incomplete without the mention of the people who made it possible, whose constant
guidance and encouragement crown all the efforts with success.
We avail this opportunity to express our deep sense of gratitude and hearty
thanks to Shri CH. Venugopal Reddy, Secretary & Correspondent of BIET, for
providing congenial atmosphere and encouragement.
We would like to thank Prof. G. Kumaraswamy Rao, Director, Former Director &
O.S. of DLRL Ministry of Defence, and Dr. V. Srinivas Rao, Dean CSE for having
provided all the facilities and support.
We would like to thank our Academic Incharge Dr. Deepak Kachave, Associate
Professor of CSE, for their expert guidance and encouragement at various levels of
Seminar.
We are thankful to our Seminar Supervisor Mr. Naresh, Assistant Professor, Computer
Science and Engineering for his support and cooperation throughout the process of this
Seminar.
We are thankful to Seminar Coordinator Dr. Rama Prakasha Reddy Ch, Assistant
Professor, Computer Science and Engineering for his support and cooperation
throughout the process of this Seminar.
We place highest regards to our Parents, our Friends and Well wishers who helped a lot
in making the report of this Seminar.
DECLARATION
Public Wi-Fi has become an essential feature of modern life, offering convenient and cost-free
internet access in cafes, airports, libraries, and other public spaces. While the promise of
connectivity brings numerous advantages, including productivity, accessibility, and enhanced
communication, it is not without risks. Public Wi-Fi networks often lack robust security measures,
making them a prime target for cybercriminals. Risks such as data interception, malware injection,
and phishing attacks can compromise personal and sensitive information, jeopardizing user privacy
and security. This seminar explores the dual nature of public Wi-Fi, addressing both its benefits and
potential threats. Key topics include an overview of the technical vulnerabilities inherent in public
networks, methods attackers use to exploit them, and the consequences for individuals and
organizations. The discussion will also highlight preventive measures users can adopt to mitigate
these risks, such as the use of Virtual Private Networks (VPNs), encrypted connections, and best
practices for secure browsing. Through real-world examples and case studies, participants will gain
a deeper understanding of the complexities of public Wi-Fi security and the tools available to
navigate these challenges effectively. Whether you are a casual internet user, a business
professional, or an IT specialist, this seminar aims to equip you with the knowledge and strategies
necessary to harness the benefits of public Wi-Fi while safeguarding your digital assets. Join us to
discover how to navigate the promise and perils of public Wi-Fi and stay secure in an increasingly
connected world.
......................................... . xi
Table of Contents xi
.................................... .
i
List of
Figures....................................... .
1
1
Introduction 1
1.1
Motivation 1
1.2
Problem definition 1
1.3
Objective of the project 2
2
Literature survey 5
3
Existing System analysis 5
4
Existing System design
4.1
Existing System architecture
6
4.2
Module description
6
4.3
Algorithm
6
5
Conclusion
8
6
References
List of figures
1 System Architecture 6
3 Test cases 11
1. INTRODUCTION
1.1 MOTIVATION
In an era of increasing digital dependency, public Wi-Fi has emerged as a cornerstone of modern
connectivity, providing seamless access to the internet in public spaces such as cafes, airports, and
libraries. Its widespread availability facilitates communication, boosts productivity, and enables
users to stay connected on the go. However, this convenience comes at a cost. Public Wi-Fi
networks are often poorly secured, creating an attractive gateway for cybercriminals to exploit
vulnerabilities and compromise personal data. The motivation behind this seminar lies in addressing
the critical need to balance the advantages of public Wi-Fi with its associated risks. Many users
remain unaware of the potential threats, such as data breaches, identity theft, and unauthorized
access to sensitive information. Raising awareness and providing actionable solutions can empower
individuals and organizations to harness the benefits of public Wi-Fi while mitigating its dangers.
Furthermore, as remote work and digital transactions become the norm, the risks associated with
public Wi-Fi have grown exponentially. The seminar aims to educate users on practical strategies,
such as using Virtual Private Networks (VPNs), avoiding unsecured websites, and employing
encryption techniques to ensure safer online experiences. By exploring both the promise and perils
of public Wi-Fi, this seminar seeks to inspire informed decision-making and promote a secure,
connected lifestyle. It is driven by the belief that with proper knowledge and tools, users can
navigate public Wi-Fi networks responsibly and confidently.
Public Wi-Fi has become an indispensable part of everyday life, providing users with free and
convenient internet access in various locations such as cafes, airports, and public libraries.
However, the widespread adoption of these networks has introduced significant security and
privacy challenges. Public Wi-Fi networks often lack proper encryption and authentication
mechanisms, leaving users vulnerable to cyber threats such as data interception, man-in-the-middle
attacks, malware distribution, and phishing scams. While these networks offer undeniable benefits,
including enhanced connectivity and productivity, the risks associated with their use are often
underestimated by users. Many individuals unknowingly expose sensitive information, such as
login credentials, financial data, and personal details, when connecting to unsecured networks.
Organizations also face potential breaches when employees use public Wi-Fi for work-related tasks,
leading to compromised data and security loopholes. The critical challenge lies in balancing the
benefits of public Wi-Fi with the need for robust security measures. There is a pressing need to
raise awareness about these risks and to develop practical, user-friendly solutions that enable safe
and secure use of public Wi-Fi networks. This seminar seeks to address these issues by analyzing
the inherent vulnerabilities of public Wi-Fi, understanding the methods used by attackers, and
exploring strategies and tools that can mitigate these risks effectively.
XIII
1.3 OBJECTIVE OF PROJECT
The "Navigating the Promise and Perils of Public Wi-Fi" is to explore the benefits and risks
associated with using public Wi-Fi networks. The project aims to provide a comprehensive
understanding of how public Wi-Fi can enhance connectivity and convenience for users,
especially in public spaces like cafes, airports, and libraries. However, it also addresses the
potential dangers such as data interception, hacking, and security vulnerabilities that come with
using unsecured networks. By examining these aspects, the project seeks to educate users on
best practices for staying safe while utilizing public Wi-Fi and to develop solutions that
mitigate risks, ensuring a safer and more secure online experience in public spaces..
XIII
2. LITERATURE SURVEY
AUTHORS: P r a t e e k B h e e v g a d e , C h i r a n t a n S a h a , R a h u l N a t h ,
Siddharth Dabhade, Haresh Barot, and S.O.Junare
ABSTRACT: The rise of public Wi-Fi is increasing daily, and as it expands, it comes
with many new opportunities and challenges. In this paper, you will find out why most
intruders use public Wi-Fi to conduct cyber-criminal activities and how intruders can
easily access your data or download your data as you have connected through malicious
public Wi-Fi networks. In this research work, a survey has been done to determine why
people prefer public Wi-Fi networks or private Wi-Fi. Experimental work focuses on
intruders using ATHEROS (Hardware) and Wireshark & N-Map (Software) to extract data
from open public Wi-Fi. At the same time, using public Wi-Fi, how to secure your data
and its safety measurements and tips are given.
XIII
multifaceted approach-encompassing advanced technology, policy enforcement,
and user education-to enhance the security of public Wi-Fi networks and ensure
XIII
2.3 ADOPTION OF PUBLIC WIFI USING UTAUT2
AUTHORS: Reema Aswania, P. Vigneswara Ilavarasana , Arpan Kumar Kara , Shrihari Vijayana
ABSTRACT: The dependence on information technology has evidently increased over the
past decade. With the increased internet use and the need for accessing information on the
go, the use of wireless internet has also been on the higher side. This need for always
staying connected to the web has opened avenues for the usage of public internet services.
The current study thus investigates the adoption of these public WiFi by the consumers.
The study adopts the conceptual model of UTAUT2 which uses various variables to explain
the acceptance of technology. The analysis uses the data procured from 257 respondents
through a structured questionnaire which collects data surrounding model variables along
with the demographics of the users. Variables including Facilitating Condition,
Performance Expectancy, Effort Expectancy, Social Influence, Hedonic Motivation, Trust,
Individual Characteristics, Business Intention and Usage are considered to be influencing
the acceptance of public WiFi technology. The statistical analysis of the responses has been
done by conducting tests on reliability and validity. The regression analysis and path
analysis lead to the findings which may be useful by various stakeholders for decision
making surrounding the promotion of their services in the sector.
XIII
2.5 WIRELESS SENSING—WI-FI SIGNAL-BASED RECOGNITION OF
HUMAN ACTIVITIES
AUTHORS: Chao Wang∗ , Siwen Chen, Yanwei Yang, Feng Hu, Fugang Liu,
and Jie Wu
ABSTRACT: With the rapid development and wide deployment of wireless technology,
Wi-Fi signals have no longer been confined to the Internet as a communication medium.
Wi-Fi signals will be modulated again by human actions when propagating indoors,
carrying rich human body state information. Therefore, a novel wireless sensing technology
is gradually emerging that can realize gesture recognition, human daily activity detection,
identification, indoor localization and human body tracking, vital signs detection, imaging,
and emotional recognition by extracting effective feature information about human actions
from Wi-Fi signals. Researchers mainly use channel state information or frequency
modulated carrier wave in their current implementation schemes of wireless sensing
technology, called “Walls have eyes”, and these schemes cover radio-frequency technology,
signal processing technology, and machine learning. These available wireless sensing
systems can be used in many applications such as smart home, medical health care, search-
and-rescue, security, and with the high precision and passively device-free through-wall
detection function. This paper elaborates the research actuality and summarizes each system
structure and the basic principles of various wireless sensing applications in detail.
Meanwhile, two popular implementation schemes are analyzed. In addition, the future
diversely application prospects of wireless sensing systems are presented.
XIII
3. EXISTING SYSTEM ANALYSIS
1. Security Vulnerabilities
2. Lack of Authentication
3. Malware Distribution
4. Limited Encryption
5. Lack of Privacy
.
XIII
4. EXISTING SYSTEM DESIGN
I.Data Collection
Data collection is the process of gathering information to answer research questions, test
hypotheses, or inform decisions. It involves choosing between qualitative data, which is
descriptive, and quantitative data, which is numerical. Common methods include surveys,
interviews, observations, and experiments. Data collection tools like online surveys, mobile apps,
and data loggers help gather and organize information efficiently. Ethical considerations, such as
XIII
informed consent and confidentiality, are crucial to protect participants' rights. The process also
requires careful sampling to avoid bias and ensure accuracy, as well as proper analysis to identify
trends and insights. Data collection is essential across fields like market research, healthcare,
education, and business, forming the foundation for informed decision-making.
2. Data Preprocessing
Data preprocessing for a module like "Navigating the Promise and Perils of Public Wi-Fi"
typically involves cleaning and transforming raw data collected from public Wi-Fi networks. This
process ensures the data is ready for analysis, focusing on areas such as network security,
performance metrics, and user behaviors. The steps can include removing irrelevant information,
handling missing data, normalizing metrics like signal strength or bandwidth usage, and encoding
categorical variables such as device types or user locations. Proper preprocessing helps to ensure
that subsequent analyses, like security risk assessments or performance evaluations, yield reliable
insights.
3. Model Selection
The Model Selection section of the "Navigating the Promise and Perils of Public Wi-Fi"
module focuses on choosing the most appropriate model for ensuring both performance and
security in public Wi-Fi networks. It examines various models of public Wi-Fi architectures,
weighing the benefits of open access versus security measures such as encryption and
authentication protocols. The section aims to guide users through understanding different
models, including centralized, decentralized, and hybrid approaches, and selecting the optimal
one based on factors like network size, user density, and security requirements. Key
considerations include scalability, ease of implementation, cost-effectiveness, and the balance
between user experience and data protection.
XIII
4. Predict the results
When navigating the promise and perils of public Wi-Fi architecture, the results typically
reflect both the convenience and the security risks involved. On the one hand, public Wi-Fi
provides users with easy access to the internet without requiring data plans or cellular
connections, fostering increased connectivity and collaboration. However, this open
accessibility also exposes users to potential cyber threats, including data breaches, man-in-the-
middle attacks, and malware infections. The outcome of this balance depends largely on the
security measures implemented, such as encryption protocols, secure authentication, and user
awareness. Properly designed public Wi-Fi networks that mitigate these risks offer seamless
access while minimizing vulnerabilities.
XIII
4.3 Algorithm:
" The Advanced Encryption Standard (AES) algorithm is widely regarded as one of the most
secure encryption methods for protecting data over public Wi-Fi networks. AES uses
symmetric key encryption, meaning the same key is used for both encryption and decryption. It
operates on fixed-size blocks of data (128 bits), and depending on the key length—128, 192, or
256 bits—it provides varying levels of security. AES encrypts plaintext into ciphertext using
several rounds of transformation, with the number of rounds depending on the key size (10
rounds for 128-bit, 12 for 192-bit, and 14 for 256-bit).
The formula for AES encryption can be expressed in simplified terms as:
C=Ek(P)
Where:
XIII
FIG 2. ADVANCED ENCRYPTION STANDARD(AES)
XIII
XIII
5. CONCLUSION
The Navigating the promise and perils of public Wi-Fi highlights both the convenience and the
risks that come with using free internet access in public spaces. On one hand, public Wi-Fi
offers significant benefits, such as allowing users to stay connected while traveling, working
remotely, or enjoying a coffee at a café. It provides an affordable and easy way to access the
internet without using cellular data, making it an attractive option for many. However, these
networks often lack robust security measures, making them vulnerable to cyber threats like
hacking, data theft, and malware distribution. Attackers can exploit weaknesses in public Wi-
Fi to intercept sensitive information such as passwords, banking details, and personal
communications. To mitigate these dangers, users should take precautions, including using
virtual private networks (VPNs), avoiding accessing sensitive accounts, and ensuring their
devices are up-to-date with the latest security patches. Additionally, public Wi-Fi providers
must invest in stronger security protocols to protect their users. By balancing convenience with
caution, users can safely enjoy the benefits of public Wi-Fi without exposing themselves to
unnecessary risks. Ultimately, awareness and vigilance are key in safeguarding privacy in
these shared, unprotected environments.
XIII
6. REFERENCES
1. Lee, J., Kim, J., & Seo, J. (2019, January). Cyber attack scenarios on smart city and their
ripple effects. In 2019 International Conference on Platform Technology and Service
(PlatCon) (pp. 1-5). IEEE.
2. Golbeck, J. (2020, October). User concerns with personal routers used as public Wi-fi
hotspots. In 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile
Communication Conference (UEMCON) (pp. 571-576). IEEE.
3. Anamalamudi, S., Sangi, A. R., Alkatheiri, M., Muhaya, F. T. B., & Liu, C. (2018). 5G-
Wlan security. A Comprehensive Guide to 5G Security, 143-163.
5. Oliveira, L., Schneider, D., De Souza, J., & Shen, W. (2019). Mobile device detection
through WiFi probe request analysis. IEEE Access, 7, 98579-98588.
6. Yeboah-Ofori, A., Islam, S., & Yeboah-Boateng, E. (2019, May). Cyber threat
intelligence for improving cyber supply chain security. In 2019 International Conference on
Cyber Security and Internet of Things (ICSIoT) (pp. 28-33). IEEE.
7. Maimon, D., Becker, M., Patil, S., & Katz, J. (2017). {Self-Protective} Behaviors Over
Public {WiFi} Networks. In The LASER Workshop: Learning from Authoritative Security
Experiment Results (LASER 2017) (pp. 69-76).
https://www.usenix.org/system/files/conference/laser201 7/laser2017_maimon.pdf (lit 4)
10. Cheng, N., Wang, X. O., Cheng, W., Mohapatra, P., & Seneviratne, A. (2013, April).
Characterizing privacy leakage of public wifi networks for users on travel. In 2013
Proceedings IEEE INFOCOM (pp. 2769-2777) IEEE.
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumb er=6567086