Authors :
Amaka Eugenia Ngozi; Okpalla Chidimma Lilian; Ezea Jonathan Ikechukwu; Ibeneme-Sabinus Ifeoma Livina; Nworuh Godwinner Emeka; Atomatofa Emmanuel Oghenero; Gloria Ngozi Ezeh; Ugbor Ihechiluru Chinwe; A. A. Galadima
Volume/Issue :
Volume 11 - 2026, Issue 2 - February
Google Scholar :
https://tinyurl.com/4j7vma37
Scribd :
https://tinyurl.com/y4su97zk
DOI :
https://doi.org/10.38124/ijisrt/26feb804
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
The improvement of consumer-grade Wi-fi routers greatly ascertained wide access to the global internet, though
with numerous security challenges. Thus, existing research evidence confirmed that many users maintain weak passwords,
while routers firmware were left outdated and lots of security misconfiguration settings. However, these security flaws were
exploited by various attack mechanisms such as brute force attacks, phishing attacks among others, leading to invasion of
user’s privacy and campaign launch for distributed denial-of-service (DDoS). Notably, this research developed Secured
Router Security Assessment System (SRSAS), applying a machine learning mechanism for evaluating Wi-Fi router password
authentications. The system, however, classified the password authentication into three different categories such as Weak,
Good and Strong. Similarly, the system used 60,000 datasets of labelled passwords to train the models. Hence, improving
the reliability of the system incorporated entropy analysis, checking against known data breaches and generating suggestions
to the users for stronger passwords. The results show that the system performs well in predicting password strength and in
offering realistic advice for improving router security. The work therefore contributes both academically and practically: it
demonstrates how machine learning can be applied to real-world network security and gives everyday users a tool for
improving the safety of their home routers.
Keywords :
Router Security, Wi-Fi Vulnerability, Password Strength, Machine Learning, Entropy Analysis.
References :
- Alturki, B., & Alsulami, A. A. (2025). Semi-Supervised Learning with Entropy Filtering for Intrusion Detection in Asymmetrical IoT Systems. Symmetry, 17(6). https://doi.org/10.3390/sym17060973
- Ammu, E., & Devanathan, B. (n.d.). A Comparison study of various Wireless Intrusion Detection Systems. International Journal on Science and Technology (IJSAT) IJSAT25049500, 16(4). Retrieved www.ijsat.org•
- Bhardwaj, A., Bharany, S., Abulfaraj, A. W., Osman Ibrahim, A., & Nagmeldin, W. (2024). Fortifying home IoT security: A framework for comprehensive examination of vulnerabilities and intrusion detection strategies for smart cities. Egyptian Informatics Journal, 25. https://doi.org/10.1016/j.eij.2024.100443
- Chatzisofroniou, G., & Kotzanikolaou, P. (2025). Security analysis of the Wi-Fi Easy Connect. International Journal of Information Security, 24(2). https://doi.org/10.1007/s10207-025-00988-3
- Farhan, M., Waheed ud din, H., Ullah, S., Hussain, M. S., Khan, M. A., Mazhar, T., Khattak, U. F., & Jaghdam, I. H. (2025). Network-based intrusion detection using deep learning technique. Scientific Reports, 15(1), 1–15. https://doi.org/10.1038/s41598-025-08770-0
- Gambo, A. Y., Gambo, F. L., Abdullahi, A. A., Ibrahim, N., Maitama, Y. I., & Zakari, Z. A. (2024a). Improving intrusion detection system accuracy using deep neural network. Dutse Journal of Pure and Applied Sciences, 10(2c), 68–74. https://doi.org/10.4314/dujopas.v10i2c.7
- Gambo, A. Y., Gambo, F. L., Abdullahi, A. A., Ibrahim, N., Maitama, Y. I., & Zakari, Z. A. (2024b). Improving intrusion detection system accuracy using deep neural network. Dutse Journal of Pure and Applied Sciences, 10(2c), 68–74. https://doi.org/10.4314/dujopas.v10i2c.7
- Hu, H., Myers, S., Colizza, V., & Vespignani, A. (2009). WiFi networks and malware epidemiology. www.pnas.org/cgi/content/full/
- Karmous, N., Aoueileyine, M. O. E., Abdelkader, M., Romdhani, L., & Youssef, N. (2024). Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices. Sensors, 24(15). https://doi.org/10.3390/s24155022
- Kaushik, K., Bhardwaj, A., & Dahiya, S. (2025). Framework to analyze and exploit the smart home IoT firmware. Measurement: Sensors, 37. https://doi.org/10.1016/j.measen.2024.101406
- Liu, J. (2024). Enhancing Network Security Through Router-Based Firewalls: An Investigation into Design, Effectiveness, and Human Factors. In Highlights in Science, Engineering and Technology CSIC (Vol. 2023).
- M. M., Y., K. G., F., M., C., & L. C., O. (2024). An Efficient Security Routing Protocol for Cloud-Based Networks Using Cisco Packet Tracer. British Journal of Computer, Networking and Information Technology, 7(2), 49–67. https://doi.org/10.52589/bjcnit-oyirlauk
- Magara, T., & Zhou, Y. (2024). Internet of Things (IoT) of Smart Homes: Privacy and Security. Journal of Electrical and Computer Engineering, 2024. https://doi.org/10.1155/2024/7716956
- Oughton, E., Geraci, G., Polese, M., Shah, V., Bubley, D., & Blue, S. (2024). Reviewing wireless broadband technologies in the peak smartphone era: 6G versus Wi-Fi 7 and 8. Telecommunications Policy, 48(6). https://doi.org/10.1016/j.telpol.2024.102766
- Quach, S., Dang, S., Thaichon, P., Le, D., & Le, T. H. H. (2025). Data vulnerability: does privacy protection behaviour improve digital well-being? European Journal of Marketing. https://doi.org/10.1108/EJM-12-2022-0953
- Radha, M. C., Midunkumar, M. R., Muralibabu, M. S., Partheeban, M. V, & Mani, M. C. (n.d.). Enhancement of Security in Wireless Network. In International Journal of Scientific Research & Engineering Trends (Vol. 10, Number 6).
- Sebestyen, H., Popescu, D. E., & Zmaranda, R. D. (2025). A Literature Review on Security in the Internet of Things: Identifying and Analysing Critical Categories. In Computers (Vol. 14, Number 2). Multidisciplinary Digital Publishing Institute (MDPI). https://doi.org/10.3390/computers14020061
- Sivagaminathan, V., Sharma, M., & Henge, S. K. (2023). Intrusion detection systems for wireless sensor networks using computational intelligence techniques. Cybersecurity, 6(1). https://doi.org/10.1186/s42400-023-00161-0
- Su, B., Huang, J., Miao, K., Wang, Z., Zhang, X., & Chen, Y. (2023). K-Anonymity Privacy Protection Algorithm for Multi-Dimensional Data against Skewness and Similarity Attacks. Sensors, 23(3). https://doi.org/10.3390/s23031554
- Sugai, R., Sei, Y., Tahara, Y., & Ohsuga, A. (2023). A k-Anonymization Method for Social Network Data with Link Prediction. International Conference on Information Systems Security and Privacy, 493–500. https://doi.org/10.5220/0011676800003405
- Sweeney, L. (2002). L. Sweeney. k-anonymity: a model for k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY 1. In International Journal on Uncertainty, Fuzziness and Knowledge-based Systems (Vol. 10, Number 5).
- Torra, V., & Navarro-Arribas, G. (2023). Attribute disclosure risk for k-anonymity: the case of numerical data. International Journal of Information Security, 22(6), 2015–2024. https://doi.org/10.1007/s10207-023-00730-x
- Ussipov, N., Akhtanov, S., Turlykozhayeva, D., Temesheva, S., Akhmetali, A., Zaidyn, M., Namazbayev, T., Bolysbay, A., Akniyazova, A., & Tang, X. (2024). MEGA: Maximum-Entropy Genetic Algorithm for Router Nodes Placement in Wireless Mesh Networks. Sensors, 24(20). https://doi.org/10.3390/s24206735
- Valvi, H., Mohan, A., & Nair, S. S. (2025). Analyzing Router Firmware for Potential Security Weaknesses. International Research Journal of Engineering and Technology. www.irjet.net
- Vardakis, G., Hatzivasilis, G., Koutsaki, E., & Papadakis, N. (2024). Review of Smart-Home Security Using the Internet of Things. In Electronics (Switzerland) (Vol. 13, Number 16). Multidisciplinary Digital Publishing Institute (MDPI). https://doi.org/10.3390/electronics13163343
- Vehkjärvi, P. (n.d.). Understanding the Risks of Home Wi-Fi Router Breaches on Corporate Off-Site.
- Xing, L., Zhang, D., Wu, H., Ma, H., & Zhang, X. (2023). Distributed K-Anonymous Location Privacy Protection Algorithm Based on Interest Points and User Social Behavior. Electronics (Switzerland), 12(11). https://doi.org/10.3390/electronics12112446
- Ye, J., de Carné de Carnavalet, X., Zhao, L., Zhang, M., Wu, L., & Zhang, W. (2024). Exposed by Default: A Security Analysis of Home Router Default Settings. ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 63–79. https://doi.org/10.1145/3634737.3637671
- Ye, J., De Carne De Carnavalet, X., Zhao, L., Zhang, M., Wu, L., & Zhang, W. (2025). Exposed by Default: A Security Analysis of Home Router Default Settings and Beyond. IEEE Internet of Things Journal, 12(2), 1182–1199. https://doi.org/10.1109/JIOT.2024.3502405
The improvement of consumer-grade Wi-fi routers greatly ascertained wide access to the global internet, though
with numerous security challenges. Thus, existing research evidence confirmed that many users maintain weak passwords,
while routers firmware were left outdated and lots of security misconfiguration settings. However, these security flaws were
exploited by various attack mechanisms such as brute force attacks, phishing attacks among others, leading to invasion of
user’s privacy and campaign launch for distributed denial-of-service (DDoS). Notably, this research developed Secured
Router Security Assessment System (SRSAS), applying a machine learning mechanism for evaluating Wi-Fi router password
authentications. The system, however, classified the password authentication into three different categories such as Weak,
Good and Strong. Similarly, the system used 60,000 datasets of labelled passwords to train the models. Hence, improving
the reliability of the system incorporated entropy analysis, checking against known data breaches and generating suggestions
to the users for stronger passwords. The results show that the system performs well in predicting password strength and in
offering realistic advice for improving router security. The work therefore contributes both academically and practically: it
demonstrates how machine learning can be applied to real-world network security and gives everyday users a tool for
improving the safety of their home routers.
Keywords :
Router Security, Wi-Fi Vulnerability, Password Strength, Machine Learning, Entropy Analysis.