Skip to main content
Article thumbnail
Location of Repository

Geofencing Components and Existing Models

By Anthony C. Ijeh, David Preston, Chris O. Imafidon, Titus Bitek Watmon, Annette O. Uwaechie, Aaron Aniagolu Nwabude and Ebrina Kujabi

Abstract

This paper describes the various Geofencing Components and Existing Models in terms of their Information Security Control Attribute Profiles. The profiles will dictate the security attributes that should accompany each and every Geofencing Model used for Wi-Fi network security control in an organization, thus minimizing the likelihood of malfunctioning security controls. Although it is up to an organization to investigate the best way of implementing information security for itself, by looking at the related models that have been used in the past this paper will present models commonly used to implement information security controls in the organizations. Our findings will highlight the strengths and weaknesses of the various models and present what our experiment and prototype consider as a robust Geofencing Security Model for securing Wi-Fi Network

OAI identifier: oai:roar.uel.ac.uk:1709

Suggested articles


To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.