The Role of Client Isolation in ProtectingWi-Fi Users from ARP Spoofing Attacks

Timur Mirzoev*, Joel Stacey White**
* Professor of Information Technology Department, Georgia, Southern University, United States.
** Office of Information & Instructional Technology at Bainbridge College.
Periodicity:March - May'2012


This study investigates the role of the client isolation technology Public Secure Packet Forwarding (PSPF) in defending 802.11 wireless (Wi-Fi) clients, connected to a public wireless access point, from Address Resolution Protocol (ARP) cache poisoning attacks, or ARP spoofing. Exploitation of wireless attack vectors such as these have been on the rise and some have made national and international news. Although client isolation technologies are common place in most wireless access points, they are rarely enabled by default. Since an average user generally has a limited understanding of IP networking concepts, it is rarely enabled during access point configurations. Isolating wireless clients from one another on unencrypted wireless networks is a simple and potentially effective way of protection. The purpose of this research is to determine if a commonly available and easily implementable wireless client isolation security technology, such as PSPF, is an effective method for defending wireless clients against attacks.


wireless networking, Wi-Fi, information security, ARP poisoning, PSPF

How to Cite this Article?

Mirzoev, T., and White, S. J. (2012). The Role Of Client Isolation In Protecting Wi-Fi Users From ARP Spoofing Attacks. i-manager’s Journal on Information Technology, 1(2), 11-17.


[1]. Ali, F. (2008). IP Spoofing. The Internet Protocol Journal, Volume 10, No. 4. Retrieved January 30, 2011, from _issues/ipj_10-4/104_ip-spoofing.html.
[2]. Bowman, B. (2003). WPA Wireless Security for Home Networks. Retrieved February 5, 2011, from bowman_03july28.mspx.
[3]. Brodkin, J. (2011). Windows drops below 90% market share. Network World, January13, 2011. Retrieved January 29, 2011, from blog/windows-drops-below-90-market-share.
[4]. Butler, E. (2010). Firesheep. Codebutler. Retrieved January 28, 2011, from
[5]. Cayirci, E., & Rong, C. (2009). Security in Wireless Ad Hoc and Sensor Network. The Atrium, Southern Gate, Chichester, West Sussex, United Kingdom: John Wiley & Sons Ltd.
[6]. Ciampa, M. (2006). CWNA Guide to Wireless LANs, Second Edition. 25 Thompson Place, Boston, MA: Thompson Course Technology.
[7]. Cisco. (2010). Chapter 6 – Configuring Radio Setting. Enabling and Disabling Public Secure Packet Forwarding. Cisco IOS Software Configuration Guide for Cisco Aironet Access Points Cisco IOS Releases 12.4(10b)JA and 12.3(8)JEC. Retrieved Januar y 30, 2011 from 2.4_10b_JA/configuration/guide/scg12410b-chap6- radio.html#wp1038494.
[8]. Cisco. (2011). Cisco Unified Wireless Network Solutions Guide: The Benefits of Cisco Unified Wireless Network Mobility Services for Educational Institutions. Cisco Aironet 1500 Series. Retrieved Januar y 30, 2011, from 79/ps6548/prod_brochure0900aecd80565d2d.html#wp 9000004.
[9]. Cross, M. (2008). Scene of the Cybercrime, Second Edition. 30 Corporate Drive, Burlington, MA: Syngress Publishing, Inc.
[10]. Di Pasquale, A. (2011). ArpOn – Arp handler inspectiON. ARPON. Retrieved January 30, 2011, from
[11]. Gahran, A. (2010). Using Wi-Fi? Firesheep may endanger your security. CNNTech, November 01, 2010. Retrieved January 28, 2011, from 2010-11-01/tech/firesheep.wifi.security_1_firesheepfirefox- wi-fi-social-networking-sites-firefox-extensionsecurity?_ s=PM:TECH.
[12]. Graves, K. (2007). CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50. 10475 Crosspoint Blvd., Indianapolis, IN: Wiley Publishing.
[13]. Kendrick, J. (2010). Smartphone Wi-Fi Usage on the Rise. GIGAOM, August 24, 2010. Retrieved February 29, 2011, from on-the-rise/.
[14]. Leonhard, W. (2010). 'Sidejacking' browser add-on stumps security experts. InfoWorld, November 10, 2011. Retrieved March 20, 2011, from t/endpoint-security/sidejacking-browser-add-stumpssecurity- experts-790.
[15]. Marcus, D. (2010). I'll take the Firesheep with a side order of ARP Poisoning please. McAfee Labs Blog Central, October 25, 2010. Retrieved January 28, 2011, from with-a-side-order-of-arp-poisoning-please.
[16]. Miller, D., & Gregg, M. (2011). Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills, 3rd Edition. 10475 Crosspoint Blvd., Indianapolis, IN: Wiley Publishing.
[17]. Orebaugh, A. (2007). Wireshark and Ethereal Network Protocol Analyzer Toolkit. 800 Hingham Street, Rockland, MA: Syngress Publishing, Inc.
[18]. Oxid. (2011). Cain & Retrieved February 2, 2011, from
[19]. Putman, B. (2005). 802.11 WLAN Hands-On Analysis: Unleashing the Network Monitor for Troubleshooting and Optimization. 1663 Liberty Drive, Bloomington, IN: Authorhouse.
[20]. Rittinghouse, J. W., & Ransome, J. F. (2004). Wireless Operational Security. 200 Wheeler Road, Burlingtton, MA: Digital Press.
[21]. Sanders, C. (2010). Understanding Man-In-The-Middle Attacks - Part 4: SSL Hijacking., June 09, 2010. Retrieved May 3, 2011, from Man-in-the-Middle-Attacks-ARP-Part4.html.
[22]. Umar, A. (1993). Distributed Computing and Client- Server Systems. Englewood Cliffs, NJ: PrenticeHall PTR, Prentice-Hall, Inc.
[23]. Vaughan-Nichols, S. (2010). Herding Firesheep. ZDNet: Networking, November 1, 2010. Retrieved January 28, 2011, from herding-firesheep/293.
[24]. Wallingford, T. (2006). VoIP Hacks. 1005 Gravenstein Highway North, Sebastopol, CA: O'Reilly Media.
[25]. WeFi. (2011). About WeFi. WeFi. Retrieved January 30, 2011, from
[26]. Wireshark. (2011). Wireshark – Go Deep. Wireshark Foundation. Retrieved Februar y 2, 2011, from
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.