Modification of home LAN to enhance security
DOI:
https://doi.org/10.31637/epsir-2025-1424Keywords:
firewall, linux, perimeter security, router, VPN, authentication, WLAN, privacyAbstract
Introduction: Today's fiber optic networks installed in homes provide relatively advanced security with multiple configuration options. However, it is not exempt from possible failures or users being exposed to multiple threats that can compromise their security and privacy. Methodology: Based on a study and selection of the different security threats and the existing techniques to suppress or mitigate vulnerabilities, the aim is to create a more secure scheme. Two Linux routing models are proposed: router as an access point, and Linux router as an intermediary. Results: The use of devices authorized by MAC address and users and password with access limited by a firewall reduces the risk of attackers intruding into our local networks. Discussions: The installation and configuration of both models implies a series of knowledge on the part of users who wish to extend the security specifications of their networks, just as their application implies an increase in cost. Conclusions: Although better security and privacy is achieved with the proposed models, the evolution of threats and their evolution must be taken into account, so users should always follow the protection recommendations.
Downloads
References
Albarrán, C. (2024, 17 de mayo). Qué es una VPN. https://is.gd/EZPX5f
Bourdoucen, H., Al Naamany, A. y Al Kalbani, A. (2009). Impact of Implementing VPN to Secure Wireless LAN. World Academy of Science, Engineering and Technology International. Journal of Electronics and Communication Engineering, 3(3). https://doi.org/10.5281/zenodo.1072349
Cloudflare. (2020). ¿Qué es un ataque KRACK? | Cómo protegerse contra los ataques KRACK. https://www.cloudflare.com/es-es/learning/security/what-is-a-krack-attack/
De Luz, S. (13 de mayo de 2024). Descubre para qué sirve un servidor RADIUS y su funcionamiento. https://is.gd/HsjQtP
Díez Rodríguez, A. (30 de agosto de 2018). WPA3, la mayor actualización de seguridad en redes Wi-Fi desde hace más de una década. https://is.gd/eiYldX
Duò, M. (26 de junio de 2020). ¿Qué es un cortafuegos? La guía inicial de los diferentes tipos de cortafuegos y si necesitas uno. https://is.gd/hAnUJI
Equipo editorial de IONOS. (1 de marzo de 2023). iptables: cómo configurar las tablas de filtrado del núcleo de Linux. https://is.gd/WB0ef2
Ghimiray, D. (5 de diciembre de 2023). ¿Qué es un ataque de gemelo malvado? Avast. https://www.avast.com/es-es/c-evil-twin-attack
Ikechukwu, L. (5 de enero de 2024). Certificate Based Wifi Authentication With RADIUS and EAP-TLS. Smallstep Blog. https://smallstep.com/blog/eaptls-certificate-wifi
INCIBE. (10 de enero de 2019). WPA3, la mayor actualización en redes Wi-Fi de la última década. https://is.gd/li9PQ3
INCIBE. (14 de mayo de 2019). Seguridad en redes wifi: una guía de aproximación para el empresario. https://is.gd/l4YqgN
Jiménez, J. (3 de marzo de 2024). Suplantación de ARP: qué es y cómo afecta a nuestra red. RedesZone. https://www.redeszone.net/tutoriales/redes-cable/ataques-arp-spoofing-evitar/
Kumkar, V., Tiwari, A., Tiwari, P., Gupta, A. y Shrawne, S. (2012). Vulnerabilities of Wireless Security protocols (WEP and WPA2). https://is.gd/NjYoXd
Marín Valencia, J. J., Patiño Valencia, A. y Acevedo Bedoya, J. C. (2020). Implementación de un sistema de seguridad perimetral informático usando VPN, firewall e IDS. Revista Universidad Católica de Oriente, 31(45), 84-99. https://revistas.uco.edu.co/index.php/uco/article/view/284 DOI: https://doi.org/10.47286/01211463.284
Mushtaq, A. (2010). Vulnerabilidades y preocupaciones de la seguridad en redes inalámbricas. Security Technology, Disaster Recovery and Business Continuity, 122(1), 207-219. https://doi.org/10.1007/978-3-642-17610-4_23 DOI: https://doi.org/10.1007/978-3-642-17610-4_23
Najar, Z. y Mir, R. (2021). Wi-Fi: WPA2 Security Vulnerability and Solutions. Wireless Engineering and Technology, 12, 15-22. https://doi.org/10.4236/wet.2021.122002 DOI: https://doi.org/10.4236/wet.2021.122002
Nikolov, L. G. (2018). Wireless network vulnerabilities estimation. Security & Future, 2(2), 80-82. https://stumejournals.com/journals/confsec/2018/2/80
Ochoa, J. M. (6 de mayo de 2024). Tipos de vulnerabilidades en el ámbito corporativo. https://is.gd/xpAIDJ
Ramírez, I. (2 de julio de 2024). ¿Qué es una conexión VPN, para qué sirve y qué ventajas tiene? https://is.gd/TwAW9C
Zihadul, I., Rahman, K. M. A., Ibrahim, H. y Rabbi, H. (2021). Analysis the importance of VPN for Creating a Safe Connection Over the World of Internet. International Journal of Advanced Research in Computer and Communication Engineering, 10(10), 2319-5940. https://dx.doi.org/10.17148/IJARCCE.2021.101017 DOI: https://doi.org/10.17148/IJARCCE.2021.101017
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Antonio Porras Pérez

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Non Commercial, No Derivatives Attribution 4.0. International (CC BY-NC-ND 4.0.), that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).