Skip to main content
Article thumbnail
Location of Repository

Geofencing Components and Existing Models

By Anthony C. Ijeh, David Preston, Chris O. Imafidon, Titus Bitek Watmon, Annette O. Uwaechie, Aaron Aniagolu Nwabude and Ebrina Kujabi


This paper describes the various Geofencing Components and Existing Models in terms of their Information Security Control Attribute Profiles. The profiles will dictate the security attributes that should accompany each and every Geofencing Model used for Wi-Fi network security control in an organization, thus minimizing the likelihood of malfunctioning security controls. Although it is up to an organization to investigate the best way of implementing information security for itself, by looking at the related models that have been used in the past this paper will present models commonly used to implement information security controls in the organizations. Our findings will highlight the strengths and weaknesses of the various models and present what our experiment and prototype consider as a robust Geofencing Security Model for securing Wi-Fi Network

OAI identifier:

Suggested articles

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.