DISCOVERING WIRELESS NETWORKS VIA MODIFIED SCRIPTS IMPLEMENTING LINEAR ALGORITHMS FOR LINUX BASED OPERATING SYSTEMS

DISCOVERING WIRELESS NETWORKS VIA MODIFIED SCRIPTS IMPLEMENTING LINEAR ALGORITHMS FOR LINUX BASED OPERATING SYSTEMS

Authors

  • Petar Boyanov Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria

DOI:

https://doi.org/10.46687/jsar.v24i1.372

Keywords:

Analysis, Bitrates, Channel, Connection, Encryption, Frequency, Linux, Modified scripts, Monitoring, Ports, Python3, Quality, Scanning, SSID, Traffic

Abstract

In this scientific paper modified scripts, implementing linear algorithms for discovering wireless networks in Linux based operating systems are presented.

Author Biography

Petar Boyanov, Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria

Petar Boyanov, Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria Petar Boyanov, Konstantin Preslavsky University of Shumen, Faculty of Technical Sciences, Bulgaria

ORCID iD icon https://orcid.org/0000-0003-3668-6713

References

Abedi, N., Bhaskar, A., Chung, E. and Miska, M., 2015. Assessment of antenna characteristic effects on pedestrian and cyclists travel-time estimation based on Bluetooth and WiFi MAC addresses. Transportation Research Part C: Emerging Technologies, 60, pp.124-141.

Abbott-Jard, M., Shah, H. and Bhaskar, A., 2013, October. Empirical evaluation of Bluetooth and Wifi scanning for road transport. In Australasian Transport Research Forum (ATRF), 36th (Vol. 14).

Boyanov, P., Implementation of modified script for Linux based operating systems using a linear algorithm for network port scanning. A refereed Journal Scientific and Applied Research, Konstantin Preslavsky University

Press, Vol. 23, Shumen, 2022, ISSN 1314-6289 (Print), ISSN 2815-4622 (Online), pp. 48-59, DOI: https://doi.org/10.46687/jsar.v23i1.353.

Boyanov, P., A comprehensive scanning for open, closed and filtered ports in the computer systems and networks. A refereed Journal Scientific and Applied Research, Konstantin Preslavsky University Press, Vol. 23, Shumen, 2022, ISSN 1314-6289 (Print), ISSN 2815-4622 (Online), pp. 85-98, DOI: https://doi.org/10.46687/jsar.v23i1.356.

Candel, J., Mastering Python for Networking and Security: Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues, 2nd Edition. Packt Publishing, ISBN-101839217162, ISBN-13 2021, 978-1839217166, p. 538.

Čavojský, M., Uhlar, M., Ivanis, M., Molnar, M. and Drozda, M., 2018, August. User trajectory extraction based on wifi scanning. In 2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW) (pp. 115-120). IEEE.

Castignani, G., Montavont, N. and Arcia-Moret, A., 2010. Analysis and evaluation of wifi scanning strategies. Proceeding of IV Cibelec, pp.3-7.

Chilipirea, C., Petre, A.C., Dobre, C. and van Steen, M., 2016, June. Presumably simple: monitoring crowds using WiFi. In 2016 17th IEEE International Conference on Mobile Data Management (MDM) (Vol. 1, pp. 220-225). IEEE.

Choi, T., Chon, Y. and Cha, H., 2017. Energy-efficient WiFi scanning for localization. Pervasive and Mobile Computing, 37, pp.124-138.

Denis, M., Zena, C. and Hayajneh, T., 2016, April. Penetration testing: Concepts, attack methods, and defense strategies. In 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT) (pp. 1-6). IEEE.

Fulara, H., Singh, G., Jaisinghani, D., Maity, M., Chakraborty, T. and Naik, V., 2019, June. Use of machine learning to detect causes of unnecessary active scanning in WiFi networks. In 2019 IEEE 20th International

Symposium on" A World of Wireless, Mobile and Multimedia Networks"(WoWMoM) (pp. 1-9). IEEE.

Hidayat, A., Terabe, S. and Yaginuma, H., 2018. WiFi scanner technologies for obtaining travel data about circulator bus passengers: Case study in Obuse, Nagano prefecture, Japan. Transportation Research Record, 2672(45), pp.45-54.

Hidayat, A., Terabe, S. and Yaginuma, H., 2018. Determine non-passenger data from WiFi scanner data (MAC address), a case study: Romango bus, Obuse, Nagano prefecture, Japan. International Review for Spatial Planning and Sustainable Development, 6(3), pp.154-167.

Hou, P., Deng, R., Guo, J., Chen, W., Li, X. and Yu, H.Z., 2021. A WiFi scanner in conjunction with disposable multiplex paper assay for the quantitation of disease markers in blood plasma. Analytical and Bioanalytical Chemistry, 413, pp.4625-4634.

Hu, X., Song, L., Van Bruggen, D. and Striegel, A., 2015, October. Is there WiFi yet? How aggressive probe requests deteriorate energy and throughput. In Proceedings of the 2015 Internet Measurement Conference (pp. 317-323).

Huang, Z., Xu, L. and Lin, Y., 2020. Multi-stage pedestrian positioning using filtered WiFi scanner data in an urban road environment. Sensors, 20(11), p.3259.

Iliev, R., K. Ignatova. Cloud technologies for building data center system for defense and security. T. Tagarev et al. (eds.), Digital Transformation, Cyber Security and Resilience of Modern Societies, Studies in Big Data 84, ISBN 978-3-030-65721-5, Springer 2020, pp. 13-24, https://doi.org/10.1007/978-3-030-65722-2.

Liu, H., Yang, J., Sidhom, S., Wang, Y., Chen, Y. and Ye, F., 2013. Accurate WiFi based localization for smartphones using peer assistance. IEEE Transactions on Mobile Computing, 13(10), pp.2199-2214.

Liu, H., Gan, Y., Yang, J., Sidhom, S., Wang, Y., Chen, Y. and Ye, F., 2012, August. Push the limit of WiFi based localization for smartphones. In Proceedings of the 18th annual international conference on Mobile computing and networking (pp. 305-316).

Lu, H.J. and Yu, Y., 2021. Research on WiFi penetration testing with Kali Linux. Complexity, 2021, pp.1-8.

Mehta, G. and Gaur, M.S., 2014. WiFi AP Info. Exploitation and Packet Capturing on Android Devices using CONNECTOR & KALI LINUX.

Patra, S.S., Muthurajan, B., Chilukuri, B.R. and Devi, L., 2019, January. Development and evaluation of a low-cost wifi media access control scanner as traffic sensor. In 2019 11th International Conference on Communication Systems & Networks (COMSNETS) (pp. 777-782). IEEE.

Pavlova, D., Dzhelepov, V., Gindev, P., Effectiveness of information security in computer systems for object and process management. 13th International traveling seminar, Modern dimensions in European education and research area. Bulgarian-Austrian cultural dialogue, 26-31 May 2019, Sofia, “ZA BUKVITE – O Pismeneh” Publishing House, vol. 7, 2019, pp. 241-249. ISSN 2367-7988.

Petre, A.C., Chilipirea, C., Baratchi, M., Dobre, C. and van Steen, M., 2017. WiFi tracking of pedestrian behavior. In Smart Sensors Networks (pp. 309-337). Academic Press.

Sakib, M.N., Halim, J.B. and Huang, C.T., 2014, December. Determining location and movement pattern using anonymized WiFi access point BSSID. In 2014 7th International Conference on Security Technology (pp.

-14). IEEE.

Sapiezynski, P., Stopczynski, A., Wind, D.K., Leskovec, J. and Lehmann, S., 2017. Inferring person-to-person proximity using WiFi signals. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 1(2), pp.1-20.

Sapiezynski, P., Stopczynski, A., Gatej, R. and Lehmann, S., 2015. Tracking human mobility using wifi signals. PloS one, 10(7), p.e0130824.

Shi, J., Meng, L., Striegel, A., Qiao, C., Koutsonikolas, D. and Challen, G., 2016, April. A walk on the client side: Monitoring enterprise wifi networks using smartphone channel scans. In IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications (pp.1-9). IEEE.

Sofyan, M., Wardriving WiFi menggunakan Wigle pada Area Kambang Iwak Palembang. Wardriving WiFi menggunakan Wigle pada Area Kambang Iwak Palembang.

Vu, L., Nahrstedt, K., Retika, S. and Gupta, I., 2010, October. Joint bluetooth/wifi scanning framework for characterizing and leveraging people movement in university campus. In Proceedings of the 13th ACM international conference on Modeling, analysis, and simulation of wireless and mobile systems (pp. 257-265).

Vu, L., 2010. Lessons learned from bluetooth/wifi scanning deployment in university campus.

Wang, L., Chen, C.T. and Tsai, C.M., 2023, July. Research on cracking WIFI wireless network using Kali-Linux penetration testing software. In Third International Conference on Digital Signal and Computer Communications (DSCC 2023) (Vol. 12716, pp. 378-382). SPIE.

Wang, W., Joshi, R., Kulkarni, A., Leong, W.K. and Leong, B., 2013, July. Feasibility study of mobile phone WiFi detection in aerial search and rescue operations. In Proceedings of the 4th Asia-Pacific workshop on systems (pp. 1-6).

Downloads

Published

23.11.2023

How to Cite

Boyanov, P. (2023). DISCOVERING WIRELESS NETWORKS VIA MODIFIED SCRIPTS IMPLEMENTING LINEAR ALGORITHMS FOR LINUX BASED OPERATING SYSTEMS: DISCOVERING WIRELESS NETWORKS VIA MODIFIED SCRIPTS IMPLEMENTING LINEAR ALGORITHMS FOR LINUX BASED OPERATING SYSTEMS. JOURNAL SCIENTIFIC AND APPLIED RESEARCH, 24(1), 89–101. https://doi.org/10.46687/jsar.v24i1.372

Issue

Section

Communication and computer technologies

Categories

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 > >>