0% found this document useful (0 votes)
16 views

Public Wifi Seminar Report (1)

The seminar report titled 'Navigating the Promise and Perils of Public Wi-Fi' explores the benefits and risks associated with using public Wi-Fi networks, highlighting security vulnerabilities such as data interception and malware attacks. It aims to educate users on best practices for safe usage, including the use of Virtual Private Networks (VPNs) and secure browsing techniques. The report emphasizes the importance of balancing the convenience of public Wi-Fi with the need for robust security measures to protect personal and sensitive information.

Uploaded by

21e11a05o9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Public Wifi Seminar Report (1)

The seminar report titled 'Navigating the Promise and Perils of Public Wi-Fi' explores the benefits and risks associated with using public Wi-Fi networks, highlighting security vulnerabilities such as data interception and malware attacks. It aims to educate users on best practices for safe usage, including the use of Virtual Private Networks (VPNs) and secure browsing techniques. The report emphasizes the importance of balancing the convenience of public Wi-Fi with the need for robust security measures to protect personal and sensitive information.

Uploaded by

21e11a05o9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

A

Seminar Report
On
Navigating the Promise and Perils of Public Wi-Fi
Submitted in partial fulfillment of the requirement
For the award of the degree of

BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING
Jawaharlal Nehru Technological University Hyderabad

Submitted By
Sunkari Abhiram(21E11A05O9)

Under the guidance of


Mr Naresh
DEPARTMENT of CSE

Assistant Professor

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


BHARAT INSTITUTE OF ENGINEERING AND TECHNOLOGY
Accredited by NAAC, Accredited by NBA (UG Programmes: CSE, ECE)
Approved by AICTE, Affiliated to JNTUH Hyderabad
Hyderabad-501 510, Telangana.
2024-2025
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
BHARAT INSTITUTE OF ENGINEERING AND TECHNOLOGY
Accredited by NAAC, Accredited by NBA (UG Programmes: CSE, ECE)
Approved by AICTE, Affiliated to JNTUH Hyderabad
Hyderabad-501 510, Telangana

CERTIFICATE

Certified that Seminar work entitled “Navigating the


Promise and Perils of Public Wi-Fi” is a bonafide work
carried out in the IV Year I Semester by “Sunkari
Abhiram(21E11A05O9)” in partial fulfillment for the
award of Bachelor of Technology in Computer Science and
Engineering from Jawaharlal Nehru Technological
University Hyderabad during the academic year 2024-2025.
Supervisor Name: Head of the Department:
Dr. Deepak Kachave,
Mr. Naresh Academic Incharge,
Assistant Professor, Dept of Computer Science and Engineering
Dept of Computer Science and Engineering Bharat Institute of Engineering and
Bharat Institute of Engineering and Technology Hyderabad–501510
Technology Hyderabad–501510 Telangana.
Telangana.

Seminar Presentation held on...................................................

SEMINAR SUPERVISOR SENIOR FACULTY MEMBER HEAD OF THE DEPARTMENT


ACKNOWLEDGEMENT

The satisfaction that accompanies the successful completion of the task would be put
incomplete without the mention of the people who made it possible, whose constant
guidance and encouragement crown all the efforts with success.

We avail this opportunity to express our deep sense of gratitude and hearty
thanks to Shri CH. Venugopal Reddy, Secretary & Correspondent of BIET, for
providing congenial atmosphere and encouragement.

We would like to thank Prof. G. Kumaraswamy Rao, Director, Former Director &
O.S. of DLRL Ministry of Defence, and Dr. V. Srinivas Rao, Dean CSE for having
provided all the facilities and support.

We would like to thank our Academic Incharge Dr. Deepak Kachave, Associate
Professor of CSE, for their expert guidance and encouragement at various levels of
Seminar.

We are thankful to our Seminar Supervisor Mr. Naresh, Assistant Professor, Computer
Science and Engineering for his support and cooperation throughout the process of this
Seminar.

We are thankful to Seminar Coordinator Dr. Rama Prakasha Reddy Ch, Assistant
Professor, Computer Science and Engineering for his support and cooperation
throughout the process of this Seminar.

We place highest regards to our Parents, our Friends and Well wishers who helped a lot
in making the report of this Seminar.
DECLARATION

Certified that Seminar work entitled “Navigating the


Promise and Perils of Public Wi-Fi” is a genuine work
carried out in the IV Year I Semester by “Sunkari
Abhiram (21E11A05O9)” in partial fulfillment for the
award of Bachelor of Technology in Computer Science and
Engineering from Jawaharlal Nehru Technological
University Hyderabad during the academic year 2024-2025
and has not been submitted to any other course or university for the
award of degree by me.

Signature of the Student


ABSTRACT

Public Wi-Fi has become an essential feature of modern life, offering convenient and cost-free
internet access in cafes, airports, libraries, and other public spaces. While the promise of
connectivity brings numerous advantages, including productivity, accessibility, and enhanced
communication, it is not without risks. Public Wi-Fi networks often lack robust security measures,
making them a prime target for cybercriminals. Risks such as data interception, malware injection,
and phishing attacks can compromise personal and sensitive information, jeopardizing user privacy
and security. This seminar explores the dual nature of public Wi-Fi, addressing both its benefits and
potential threats. Key topics include an overview of the technical vulnerabilities inherent in public
networks, methods attackers use to exploit them, and the consequences for individuals and
organizations. The discussion will also highlight preventive measures users can adopt to mitigate
these risks, such as the use of Virtual Private Networks (VPNs), encrypted connections, and best
practices for secure browsing. Through real-world examples and case studies, participants will gain
a deeper understanding of the complexities of public Wi-Fi security and the tools available to
navigate these challenges effectively. Whether you are a casual internet user, a business
professional, or an IT specialist, this seminar aims to equip you with the knowledge and strategies
necessary to harness the benefits of public Wi-Fi while safeguarding your digital assets. Join us to
discover how to navigate the promise and perils of public Wi-Fi and stay secure in an increasingly
connected world.

Keywords : Public Wi-Fi, Cybersecurity, Data interception, Malware injection, Phishing


attacks, Network vulnerabilities, Virtual Private Network (VPN)
TABLE OF CONTENTS

Chapter No. Title Page


No.
Acknowledgement ................................... vii
. i
Declaration.................................................................. ix
..... Abstract. X

......................................... . xi
Table of Contents xi
.................................... .
i
List of
Figures....................................... .
1
1
Introduction 1
1.1
Motivation 1
1.2
Problem definition 1
1.3
Objective of the project 2
2
Literature survey 5
3
Existing System analysis 5
4
Existing System design
4.1
Existing System architecture
6
4.2
Module description
6
4.3
Algorithm
6
5
Conclusion
8
6
References
List of figures

SNo. Images Page No.

1 System Architecture 6

2 Advanced Encryption Standard (AES) 9

3 Test cases 11
1. INTRODUCTION

1.1 MOTIVATION

In an era of increasing digital dependency, public Wi-Fi has emerged as a cornerstone of modern
connectivity, providing seamless access to the internet in public spaces such as cafes, airports, and
libraries. Its widespread availability facilitates communication, boosts productivity, and enables
users to stay connected on the go. However, this convenience comes at a cost. Public Wi-Fi
networks are often poorly secured, creating an attractive gateway for cybercriminals to exploit
vulnerabilities and compromise personal data. The motivation behind this seminar lies in addressing
the critical need to balance the advantages of public Wi-Fi with its associated risks. Many users
remain unaware of the potential threats, such as data breaches, identity theft, and unauthorized
access to sensitive information. Raising awareness and providing actionable solutions can empower
individuals and organizations to harness the benefits of public Wi-Fi while mitigating its dangers.
Furthermore, as remote work and digital transactions become the norm, the risks associated with
public Wi-Fi have grown exponentially. The seminar aims to educate users on practical strategies,
such as using Virtual Private Networks (VPNs), avoiding unsecured websites, and employing
encryption techniques to ensure safer online experiences. By exploring both the promise and perils
of public Wi-Fi, this seminar seeks to inspire informed decision-making and promote a secure,
connected lifestyle. It is driven by the belief that with proper knowledge and tools, users can
navigate public Wi-Fi networks responsibly and confidently.

1.2 PROBLEM DEFINITION

Public Wi-Fi has become an indispensable part of everyday life, providing users with free and
convenient internet access in various locations such as cafes, airports, and public libraries.
However, the widespread adoption of these networks has introduced significant security and
privacy challenges. Public Wi-Fi networks often lack proper encryption and authentication
mechanisms, leaving users vulnerable to cyber threats such as data interception, man-in-the-middle
attacks, malware distribution, and phishing scams. While these networks offer undeniable benefits,
including enhanced connectivity and productivity, the risks associated with their use are often
underestimated by users. Many individuals unknowingly expose sensitive information, such as
login credentials, financial data, and personal details, when connecting to unsecured networks.
Organizations also face potential breaches when employees use public Wi-Fi for work-related tasks,
leading to compromised data and security loopholes. The critical challenge lies in balancing the
benefits of public Wi-Fi with the need for robust security measures. There is a pressing need to
raise awareness about these risks and to develop practical, user-friendly solutions that enable safe
and secure use of public Wi-Fi networks. This seminar seeks to address these issues by analyzing
the inherent vulnerabilities of public Wi-Fi, understanding the methods used by attackers, and
exploring strategies and tools that can mitigate these risks effectively.
XIII
1.3 OBJECTIVE OF PROJECT
The "Navigating the Promise and Perils of Public Wi-Fi" is to explore the benefits and risks
associated with using public Wi-Fi networks. The project aims to provide a comprehensive
understanding of how public Wi-Fi can enhance connectivity and convenience for users,
especially in public spaces like cafes, airports, and libraries. However, it also addresses the
potential dangers such as data interception, hacking, and security vulnerabilities that come with
using unsecured networks. By examining these aspects, the project seeks to educate users on
best practices for staying safe while utilizing public Wi-Fi and to develop solutions that
mitigate risks, ensuring a safer and more secure online experience in public spaces..

XIII
2. LITERATURE SURVEY

2.1 THE RISE OF PUBLIC WI-FI AND THREATS

AUTHORS: P r a t e e k B h e e v g a d e , C h i r a n t a n S a h a , R a h u l N a t h ,
Siddharth Dabhade, Haresh Barot, and S.O.Junare
ABSTRACT: The rise of public Wi-Fi is increasing daily, and as it expands, it comes
with many new opportunities and challenges. In this paper, you will find out why most
intruders use public Wi-Fi to conduct cyber-criminal activities and how intruders can
easily access your data or download your data as you have connected through malicious
public Wi-Fi networks. In this research work, a survey has been done to determine why
people prefer public Wi-Fi networks or private Wi-Fi. Experimental work focuses on
intruders using ATHEROS (Hardware) and Wireshark & N-Map (Software) to extract data
from open public Wi-Fi. At the same time, using public Wi-Fi, how to secure your data
and its safety measurements and tips are given.

2.2 SURVEY OF CHALLENGES IN SECURING PUBLIC WI-FI NETWORKS


AUTHORS: Lydiah Moraa Machora.
ABSTRACT: Public Wi-Fi networks are integral to modern connectivity, offering
users convenient internet access in public spaces such as cafes, airports, and
libraries. However, their open nature and lack of robust security mechanisms make
them vulnerable to a myriad of cyber threats, posing significant risks to user data,
privacy, and overall network integrity. This paper explores the key challenges in
securing public Wi-Fi networks, including issues such as unencrypted
communication, rogue access points, man-in-the-middle attacks, and user
authentication vulnerabilities. Additionally, the impact of user behavior, the
proliferation of insecure IoT devices, and the absence of standardized security
practices are examined. While emerging technologies like WPA3, Opportunistic
Wireless Encryption (OWE), and AI-driven threat detection offer promising
solutions, their adoption faces barriers due to legacy systems, cost constraints, and
lack of user awareness. By analyzing these challenges and evaluating current
mitigation strategies, this paper aims to highlight the critical need for a

XIII
multifaceted approach-encompassing advanced technology, policy enforcement,
and user education-to enhance the security of public Wi-Fi networks and ensure

safer connectivity in the digital age.

XIII
2.3 ADOPTION OF PUBLIC WIFI USING UTAUT2

AUTHORS: Reema Aswania, P. Vigneswara Ilavarasana , Arpan Kumar Kara , Shrihari Vijayana
ABSTRACT: The dependence on information technology has evidently increased over the
past decade. With the increased internet use and the need for accessing information on the
go, the use of wireless internet has also been on the higher side. This need for always
staying connected to the web has opened avenues for the usage of public internet services.
The current study thus investigates the adoption of these public WiFi by the consumers.
The study adopts the conceptual model of UTAUT2 which uses various variables to explain
the acceptance of technology. The analysis uses the data procured from 257 respondents
through a structured questionnaire which collects data surrounding model variables along
with the demographics of the users. Variables including Facilitating Condition,
Performance Expectancy, Effort Expectancy, Social Influence, Hedonic Motivation, Trust,
Individual Characteristics, Business Intention and Usage are considered to be influencing
the acceptance of public WiFi technology. The statistical analysis of the responses has been
done by conducting tests on reliability and validity. The regression analysis and path
analysis lead to the findings which may be useful by various stakeholders for decision
making surrounding the promotion of their services in the sector.

2.4 SECURITY THREATS TO WIRELESS NETWORKS

AUTHORS: Umesh Kumar and Sapna Gambhir

ABSTRACT: In the recent years we have huge development of wireless technology. We


are presently getting more subject to wireless technology. As we know wireless networks
have broadcast nature so there are different security issues in the wireless communication.
The security conventions intended for the wired systems can't be extrapolated to wireless
systems. Hackers and intruders can make utilization of the loopholes of the wireless
communication. In this paper we will mull over the different remote security dangers to
wireless systems and conventions at present accessible like Wired Equivalent Privacy
(WEP), Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2). WPA2 is
more hearty security convention as compared with WPA on the grounds that it utilizes the
XIII
Advanced Encryption Standard (AES) encryption. There are few issues in WPA2 like it is
helpless against brute force attack and MIC bits could be utilized by programmer to
compare it with the decoded content. So in this paper we will concentrate on different sorts
of wireless security dangers.

XIII
2.5 WIRELESS SENSING—WI-FI SIGNAL-BASED RECOGNITION OF
HUMAN ACTIVITIES
AUTHORS: Chao Wang∗ , Siwen Chen, Yanwei Yang, Feng Hu, Fugang Liu,
and Jie Wu

ABSTRACT: With the rapid development and wide deployment of wireless technology,
Wi-Fi signals have no longer been confined to the Internet as a communication medium.
Wi-Fi signals will be modulated again by human actions when propagating indoors,
carrying rich human body state information. Therefore, a novel wireless sensing technology
is gradually emerging that can realize gesture recognition, human daily activity detection,
identification, indoor localization and human body tracking, vital signs detection, imaging,
and emotional recognition by extracting effective feature information about human actions
from Wi-Fi signals. Researchers mainly use channel state information or frequency
modulated carrier wave in their current implementation schemes of wireless sensing
technology, called “Walls have eyes”, and these schemes cover radio-frequency technology,
signal processing technology, and machine learning. These available wireless sensing
systems can be used in many applications such as smart home, medical health care, search-
and-rescue, security, and with the high precision and passively device-free through-wall
detection function. This paper elaborates the research actuality and summarizes each system
structure and the basic principles of various wireless sensing applications in detail.
Meanwhile, two popular implementation schemes are analyzed. In addition, the future
diversely application prospects of wireless sensing systems are presented.

XIII
3. EXISTING SYSTEM ANALYSIS

3.1 EXISTING SYSTEM:


Navigating public Wi-Fi networks presents a complex landscape of both advantages and risks.
On the one hand, public Wi-Fi offers significant convenience, enabling users to access the
internet from cafes, airports, libraries, and other public spaces, often without the need for
mobile data. It fosters a level of connectivity that supports both personal and professional
activities. However, the risks associated with public Wi-Fi are substantial. Public networks are
generally less secure than private ones, making them attractive targets for cybercriminals
seeking to intercept data, deploy malware, or execute man-in-the-middle attacks. Without
proper encryption or secure connections, sensitive information like passwords, credit card
details, and personal communications are at risk of being compromised. As users increasingly
rely on these networks, understanding both the benefits and vulnerabilities is critical for
ensuring safe usage. Therefore, while public Wi-Fi networks are integral to modern
convenience, they must be used with caution and security measures in place to mitigate
potential threats.

3.1.1 DISADVANTAGES OF EXISTING SYSTEM:

1. Security Vulnerabilities
2. Lack of Authentication
3. Malware Distribution
4. Limited Encryption
5. Lack of Privacy
.

XIII
4. EXISTING SYSTEM DESIGN

4.1 EXISTING SYSTEM ARCHITECTURE:

FIG l.SYSTEM ARCHITECTURE

4.2 Module Description:

I.Data Collection

Data collection is the process of gathering information to answer research questions, test
hypotheses, or inform decisions. It involves choosing between qualitative data, which is
descriptive, and quantitative data, which is numerical. Common methods include surveys,
interviews, observations, and experiments. Data collection tools like online surveys, mobile apps,
and data loggers help gather and organize information efficiently. Ethical considerations, such as
XIII
informed consent and confidentiality, are crucial to protect participants' rights. The process also
requires careful sampling to avoid bias and ensure accuracy, as well as proper analysis to identify
trends and insights. Data collection is essential across fields like market research, healthcare,
education, and business, forming the foundation for informed decision-making.

2. Data Preprocessing

Data preprocessing for a module like "Navigating the Promise and Perils of Public Wi-Fi"
typically involves cleaning and transforming raw data collected from public Wi-Fi networks. This
process ensures the data is ready for analysis, focusing on areas such as network security,
performance metrics, and user behaviors. The steps can include removing irrelevant information,
handling missing data, normalizing metrics like signal strength or bandwidth usage, and encoding
categorical variables such as device types or user locations. Proper preprocessing helps to ensure
that subsequent analyses, like security risk assessments or performance evaluations, yield reliable
insights.

3. Model Selection

The Model Selection section of the "Navigating the Promise and Perils of Public Wi-Fi"
module focuses on choosing the most appropriate model for ensuring both performance and
security in public Wi-Fi networks. It examines various models of public Wi-Fi architectures,
weighing the benefits of open access versus security measures such as encryption and
authentication protocols. The section aims to guide users through understanding different
models, including centralized, decentralized, and hybrid approaches, and selecting the optimal
one based on factors like network size, user density, and security requirements. Key
considerations include scalability, ease of implementation, cost-effectiveness, and the balance
between user experience and data protection.

XIII
4. Predict the results

When navigating the promise and perils of public Wi-Fi architecture, the results typically
reflect both the convenience and the security risks involved. On the one hand, public Wi-Fi
provides users with easy access to the internet without requiring data plans or cellular
connections, fostering increased connectivity and collaboration. However, this open
accessibility also exposes users to potential cyber threats, including data breaches, man-in-the-
middle attacks, and malware infections. The outcome of this balance depends largely on the
security measures implemented, such as encryption protocols, secure authentication, and user
awareness. Properly designed public Wi-Fi networks that mitigate these risks offer seamless
access while minimizing vulnerabilities.

XIII
4.3 Algorithm:

ADVANCED ENCRYPTION STANDARD(AES)

" The Advanced Encryption Standard (AES) algorithm is widely regarded as one of the most
secure encryption methods for protecting data over public Wi-Fi networks. AES uses
symmetric key encryption, meaning the same key is used for both encryption and decryption. It
operates on fixed-size blocks of data (128 bits), and depending on the key length—128, 192, or
256 bits—it provides varying levels of security. AES encrypts plaintext into ciphertext using
several rounds of transformation, with the number of rounds depending on the key size (10
rounds for 128-bit, 12 for 192-bit, and 14 for 256-bit).

The formula for AES encryption can be expressed in simplified terms as:

C=Ek(P)

Where:

 C is the ciphertext (encrypted data),


 Ek represents the AES encryption function with a key KKK,
 P is the plaintext (original data).

AES operates through a series of steps including SubBytes (substitution), ShiftRows


(permutation), MixColumns (mixing), and AddRoundKey (key addition). By repeatedly
applying these transformations, AES ensures that even if the data is intercepted on an
unsecured public Wi-Fi network, the information remains encrypted and unreadable to
unauthorized parties. Thus, using AES for securing communication over public Wi-Fi
effectively mitigates the risks of data interception and hacking.

XIII
FIG 2. ADVANCED ENCRYPTION STANDARD(AES)

XIII
XIII
5. CONCLUSION

The Navigating the promise and perils of public Wi-Fi highlights both the convenience and the
risks that come with using free internet access in public spaces. On one hand, public Wi-Fi
offers significant benefits, such as allowing users to stay connected while traveling, working
remotely, or enjoying a coffee at a café. It provides an affordable and easy way to access the
internet without using cellular data, making it an attractive option for many. However, these
networks often lack robust security measures, making them vulnerable to cyber threats like
hacking, data theft, and malware distribution. Attackers can exploit weaknesses in public Wi-
Fi to intercept sensitive information such as passwords, banking details, and personal
communications. To mitigate these dangers, users should take precautions, including using
virtual private networks (VPNs), avoiding accessing sensitive accounts, and ensuring their
devices are up-to-date with the latest security patches. Additionally, public Wi-Fi providers
must invest in stronger security protocols to protect their users. By balancing convenience with
caution, users can safely enjoy the benefits of public Wi-Fi without exposing themselves to
unnecessary risks. Ultimately, awareness and vigilance are key in safeguarding privacy in
these shared, unprotected environments.

XIII
6. REFERENCES

1. Lee, J., Kim, J., & Seo, J. (2019, January). Cyber attack scenarios on smart city and their
ripple effects. In 2019 International Conference on Platform Technology and Service
(PlatCon) (pp. 1-5). IEEE.

2. Golbeck, J. (2020, October). User concerns with personal routers used as public Wi-fi
hotspots. In 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile
Communication Conference (UEMCON) (pp. 571-576). IEEE.

3. Anamalamudi, S., Sangi, A. R., Alkatheiri, M., Muhaya, F. T. B., & Liu, C. (2018). 5G-
Wlan security. A Comprehensive Guide to 5G Security, 143-163.

5. Oliveira, L., Schneider, D., De Souza, J., & Shen, W. (2019). Mobile device detection
through WiFi probe request analysis. IEEE Access, 7, 98579-98588.

6. Yeboah-Ofori, A., Islam, S., & Yeboah-Boateng, E. (2019, May). Cyber threat
intelligence for improving cyber supply chain security. In 2019 International Conference on
Cyber Security and Internet of Things (ICSIoT) (pp. 28-33). IEEE.

7. Maimon, D., Becker, M., Patil, S., & Katz, J. (2017). {Self-Protective} Behaviors Over
Public {WiFi} Networks. In The LASER Workshop: Learning from Authoritative Security
Experiment Results (LASER 2017) (pp. 69-76).
https://www.usenix.org/system/files/conference/laser201 7/laser2017_maimon.pdf (lit 4)

8. Muhammad, J. Does Connecting to Public Wi-Fi Have an Effect on Your Personal


Information and Privacy. http://iac.science.hamptonu.edu/media/docs/20210712_2
15730_Hammonds_ADMI2019.pdf

9. Mancinelli, D.(2014). Public Wi-fi: Friend or Foe.


https://www.cs.tufts.edu/comp/116/archive/fall2013/dma ncinelli.pdf

10. Cheng, N., Wang, X. O., Cheng, W., Mohapatra, P., & Seneviratne, A. (2013, April).
Characterizing privacy leakage of public wifi networks for users on travel. In 2013
Proceedings IEEE INFOCOM (pp. 2769-2777) IEEE.
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumb er=6567086

You might also like