Modification of home LAN to enhance security

Authors

DOI:

https://doi.org/10.31637/epsir-2025-1424

Keywords:

firewall, linux, perimeter security, router, VPN, authentication, WLAN, privacy

Abstract

Introduction: Today's fiber optic networks installed in homes provide relatively advanced security with multiple configuration options. However, it is not exempt from possible failures or users being exposed to multiple threats that can compromise their security and privacy. Methodology: Based on a study and selection of the different security threats and the existing techniques to suppress or mitigate vulnerabilities, the aim is to create a more secure scheme. Two Linux routing models are proposed: router as an access point, and Linux router as an intermediary. Results: The use of devices authorized by MAC address and users and password with access limited by a firewall reduces the risk of attackers intruding into our local networks. Discussions: The installation and configuration of both models implies a series of knowledge on the part of users who wish to extend the security specifications of their networks, just as their application implies an increase in cost. Conclusions: Although better security and privacy is achieved with the proposed models, the evolution of threats and their evolution must be taken into account, so users should always follow the protection recommendations.

Downloads

Download data is not yet available.

Author Biography

Antonio Porras Pérez, University of Granada

Computer Engineer specialized in Software Engineering from the University of Cordoba with experience in software development and management of networking devices. I am currently working as a technical specialist in computer classrooms at the University of Granada, and I am studying for my PhD in Information and Communication Technologies.

References

Albarrán, C. (2024, 17 de mayo). Qué es una VPN. https://is.gd/EZPX5f

Bourdoucen, H., Al Naamany, A. y Al Kalbani, A. (2009). Impact of Implementing VPN to Secure Wireless LAN. World Academy of Science, Engineering and Technology International. Journal of Electronics and Communication Engineering, 3(3). https://doi.org/10.5281/zenodo.1072349

Cloudflare. (2020). ¿Qué es un ataque KRACK? | Cómo protegerse contra los ataques KRACK. https://www.cloudflare.com/es-es/learning/security/what-is-a-krack-attack/

De Luz, S. (13 de mayo de 2024). Descubre para qué sirve un servidor RADIUS y su funcionamiento. https://is.gd/HsjQtP

Díez Rodríguez, A. (30 de agosto de 2018). WPA3, la mayor actualización de seguridad en redes Wi-Fi desde hace más de una década. https://is.gd/eiYldX

Duò, M. (26 de junio de 2020). ¿Qué es un cortafuegos? La guía inicial de los diferentes tipos de cortafuegos y si necesitas uno. https://is.gd/hAnUJI

Equipo editorial de IONOS. (1 de marzo de 2023). iptables: cómo configurar las tablas de filtrado del núcleo de Linux. https://is.gd/WB0ef2

Ghimiray, D. (5 de diciembre de 2023). ¿Qué es un ataque de gemelo malvado? Avast. https://www.avast.com/es-es/c-evil-twin-attack

Ikechukwu, L. (5 de enero de 2024). Certificate Based Wifi Authentication With RADIUS and EAP-TLS. Smallstep Blog. https://smallstep.com/blog/eaptls-certificate-wifi

INCIBE. (10 de enero de 2019). WPA3, la mayor actualización en redes Wi-Fi de la última década. https://is.gd/li9PQ3

INCIBE. (14 de mayo de 2019). Seguridad en redes wifi: una guía de aproximación para el empresario. https://is.gd/l4YqgN

Jiménez, J. (3 de marzo de 2024). Suplantación de ARP: qué es y cómo afecta a nuestra red. RedesZone. https://www.redeszone.net/tutoriales/redes-cable/ataques-arp-spoofing-evitar/

Kumkar, V., Tiwari, A., Tiwari, P., Gupta, A. y Shrawne, S. (2012). Vulnerabilities of Wireless Security protocols (WEP and WPA2). https://is.gd/NjYoXd

Marín Valencia, J. J., Patiño Valencia, A. y Acevedo Bedoya, J. C. (2020). Implementación de un sistema de seguridad perimetral informático usando VPN, firewall e IDS. Revista Universidad Católica de Oriente, 31(45), 84-99. https://revistas.uco.edu.co/index.php/uco/article/view/284 DOI: https://doi.org/10.47286/01211463.284

Mushtaq, A. (2010). Vulnerabilidades y preocupaciones de la seguridad en redes inalámbricas. Security Technology, Disaster Recovery and Business Continuity, 122(1), 207-219. https://doi.org/10.1007/978-3-642-17610-4_23 DOI: https://doi.org/10.1007/978-3-642-17610-4_23

Najar, Z. y Mir, R. (2021). Wi-Fi: WPA2 Security Vulnerability and Solutions. Wireless Engineering and Technology, 12, 15-22. https://doi.org/10.4236/wet.2021.122002 DOI: https://doi.org/10.4236/wet.2021.122002

Nikolov, L. G. (2018). Wireless network vulnerabilities estimation. Security & Future, 2(2), 80-82. https://stumejournals.com/journals/confsec/2018/2/80

Ochoa, J. M. (6 de mayo de 2024). Tipos de vulnerabilidades en el ámbito corporativo. https://is.gd/xpAIDJ

Ramírez, I. (2 de julio de 2024). ¿Qué es una conexión VPN, para qué sirve y qué ventajas tiene? https://is.gd/TwAW9C

Zihadul, I., Rahman, K. M. A., Ibrahim, H. y Rabbi, H. (2021). Analysis the importance of VPN for Creating a Safe Connection Over the World of Internet. International Journal of Advanced Research in Computer and Communication Engineering, 10(10), 2319-5940. https://dx.doi.org/10.17148/IJARCCE.2021.101017 DOI: https://doi.org/10.17148/IJARCCE.2021.101017

Published

2025-02-04

How to Cite

Porras Pérez, A. (2025). Modification of home LAN to enhance security. European Public & Social Innovation Review, 10, 1–19. https://doi.org/10.31637/epsir-2025-1424

Issue

Section

MISCELLANEOUS